devops-kung-fu / luchaLinks
A CLI that scans for sensitive data in source code
β14Updated 2 years ago
Alternatives and similar repositories for lucha
Users that are interested in lucha are comparing it to the libraries listed below
Sorting:
- ποΈ equivalence table between OWASP ASVS standard and STRIDE threat modeling methodology.β77Updated last year
- Compares and analyzes GCP IAM roles.β77Updated 8 months ago
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.β177Updated last year
- Protect against subdomain takeoverβ94Updated 4 months ago
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. β¦β67Updated 5 months ago
- ## Auto-archived due to inactivity. ## Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Securitβ¦β37Updated last year
- Convert cloudtrail data to MITRE ATT&CK Sightingsβ81Updated 3 years ago
- Enriching the NVD CVSS scores to include Temporal & Threat Metricsβ212Updated this week
- A tool to check the security settings of Github Organizations.β72Updated 2 years ago
- KaiMonkey provides vulnerable infrastructure as code (IaC) to help explore and understand common cloud security threats exposed via IaC.β105Updated last year
- GitGuardian Canary Tokensβ145Updated 5 months ago
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrixβ59Updated 2 years ago
- AI featured threat modeling and security review actionβ45Updated last year
- The Security Champion Framework provides both a measuring stick and a roadmap generator for Champion Programs.β111Updated last year
- A comprehensive checklist and guide for organizations looking to implement a robust cybersecurity programβ46Updated last month
- A full insecure kubernetes application for testing security toolsβ90Updated last month
- β69Updated 4 months ago
- Supply-Chain Firewall (SCFW) is a tool for preventing the installation of malicious npm and PyPI packagesβ187Updated last week
- An AI-powered tool for discovering privilege escalation opportunities in AWS IAM configurations.β117Updated last week
- Script to audit GitHub Action Workflow files for potential vulnerabilities.β156Updated last year
- Slack bot which promotes Defense in Depth/Zero Trust security practicesβ24Updated 2 years ago
- β193Updated 7 months ago
- Clean accounts over permissions in GCP infra at scaleβ71Updated 2 years ago
- Cloud Commotion intends to cause chaos to simulate security incidentsβ146Updated last year
- HashiCorp-relevant rules for the Semgrep code analysis toolβ42Updated 2 years ago
- β114Updated 2 years ago
- An evolving repository of CloudTrail events with detailed descriptions, MITRE ATT&CK insights, real-world incidents, references and securβ¦β170Updated last month
- A compilation of Software Supply Chain Security resources including initiatives, standards, regulations, organizations, vendors, tooling,β¦β138Updated last year
- An experimental project using LLM technology to generate security documentation for Open Source Software (OSS) projectsβ34Updated 9 months ago
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projectsβ98Updated last month