coinbase / salusLinks
We would like to request that all contributors please clone a *fresh copy* of this repository since the September 21st maintenance.
☆29Updated 5 months ago
Alternatives and similar repositories for salus
Users that are interested in salus are comparing it to the libraries listed below
Sorting:
- Application Security Automation☆527Updated 2 years ago
- goSDL☆522Updated last month
- A project security/vulnerability/risk scanning tool☆362Updated 4 years ago
- a ruggedization framework that embodies the principle "be mean to your code"☆994Updated 3 years ago
- Scan your code for security misconfiguration, search for passwords and secrets.☆652Updated 2 years ago
- Fetch all public IP addresses tied to your AWS account. Works with IPv4/IPv6, Classic/VPC networking, and across all AWS services☆639Updated 4 years ago
- An open source, online threat modelling tool from OWASP☆483Updated 4 months ago
- A security toolkit for Amazon S3☆462Updated last month
- Dow Jones Hammer : Protect the cloud with the power of the cloud(AWS)☆446Updated 2 years ago
- threatspec - continuous threat modeling, through code☆371Updated 4 years ago
- Public version of PagerDuty's employee security training courses.☆414Updated 2 years ago
- OWASP Cloud Security - Enabling conversations through threat and control stories☆182Updated 7 years ago
- A vulnerable version of Rails that follows the OWASP Top 10☆902Updated this week
- Fully open-source SAST scanner supporting a range of languages and frameworks. Integrates with major CI pipelines and IDE such as Azure D…☆149Updated 5 years ago
- Jackhammer - One Security vulnerability assessment/management tool to solve all the security team problems.☆738Updated last year
- k8s audit repo☆229Updated 6 years ago
- Scan is a free & Open Source DevSecOps tool for performing static analysis based security testing of your applications and its dependenci…☆856Updated 2 years ago
- all paths lead to clouds☆638Updated 2 years ago
- Cloud Security Suite - One stop tool for auditing the security posture of AWS/GCP/Azure infrastructure.☆1,163Updated 3 years ago
- A Continuous Threat Modeling methodology☆327Updated 3 years ago
- DEPRECATED — Infrastructure As Code☆401Updated 5 years ago
- AWS Security Tools (AST) in a simple Docker container.☆285Updated 4 years ago
- A honey token manager and alert system for AWS.☆321Updated 3 years ago
- An installable desktop variant of OWASP Threat Dragon☆593Updated 3 weeks ago
- Monitors Github for leaked secrets☆203Updated last year
- CLI tool that finds secrets accidentally committed to a git repo, eg passwords, private keys☆1,158Updated 2 years ago
- This project is about creating and publishing threat model examples.☆427Updated 4 years ago
- A centralized source of all AWS IAM privilege escalation methods released by Rhino Security Labs.☆922Updated 6 years ago
- Forensics acquisition framework designed to be extensible and secure☆125Updated 6 years ago
- SAMM stands for Software Assurance Maturity Model.☆395Updated 3 years ago