devops-kung-fu / luchaLinks
A CLI that scans for sensitive data in source code
β14Updated 2 years ago
Alternatives and similar repositories for lucha
Users that are interested in lucha are comparing it to the libraries listed below
Sorting:
- ποΈ equivalence table between OWASP ASVS standard and STRIDE threat modeling methodology.β75Updated last year
- AI featured threat modeling and security review actionβ45Updated last year
- Enriching the NVD CVSS scores to include Temporal & Threat Metricsβ214Updated this week
- A security tool that detects malicious packages from external vulnerability feeds and searches for them in your package registries or artβ¦β70Updated last month
- β114Updated 2 years ago
- β69Updated 5 months ago
- An experimental project using LLM technology to generate security documentation for Open Source Software (OSS) projectsβ34Updated 10 months ago
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. β¦β68Updated 6 months ago
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.β177Updated 3 weeks ago
- HashiCorp-relevant rules for the Semgrep code analysis toolβ41Updated 2 years ago
- Slack bot which promotes Defense in Depth/Zero Trust security practicesβ24Updated 2 years ago
- A tool to check the security settings of Github Organizations.β75Updated 2 years ago
- Convert cloudtrail data to MITRE ATT&CK Sightingsβ82Updated 3 years ago
- Compares and analyzes GCP IAM roles.β78Updated 10 months ago
- β193Updated 8 months ago
- Protect against subdomain takeoverβ95Updated 5 months ago
- The Security Champion Framework provides both a measuring stick and a roadmap generator for Champion Programs.β110Updated last year
- KaiMonkey provides vulnerable infrastructure as code (IaC) to help explore and understand common cloud security threats exposed via IaC.β105Updated 2 years ago
- A comprehensive checklist and guide for organizations looking to implement a robust cybersecurity programβ45Updated 3 weeks ago
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).β82Updated last year
- A collection of models for organizing, prioritizing, and understanding cybersecurity and information risk management concepts.β25Updated last year
- Semgrep rules corresponding to the OWASP ASVS standardβ27Updated 5 years ago
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projectsβ99Updated 2 months ago
- Cloud Commotion intends to cause chaos to simulate security incidentsβ146Updated last year
- Automate vulnerability triage which prioritizes remediation over discoveryβ19Updated last week
- Clean accounts over permissions in GCP infra at scaleβ71Updated 2 years ago
- An evolving repository of CloudTrail events with detailed descriptions, MITRE ATT&CK insights, real-world incidents, references and securβ¦β173Updated last month
- An AI-powered tool for discovering privilege escalation opportunities in AWS IAM configurations.β117Updated 2 weeks ago
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accountsβ61Updated 2 years ago
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrixβ59Updated 2 years ago