gauntlt / gauntlt-docker
the docker for gauntlt
☆85Updated last year
Related projects: ⓘ
- example code and lab environment for the the Security Testing class in the Lynda and LinkedIn Learning library☆86Updated 5 years ago
- Node application to help managing Maturity Models like the ones created by BSIMM and OpenSAMM☆185Updated 6 years ago
- ☆414Updated this week
- A unified DevSecOps Framework that allows you to go from iterative, collaborative Threat Modeling to Application Security Test Orchestrat…☆271Updated last week
- Helm chart to deploy Trend Micro Deep Security Smart Check.☆44Updated 5 months ago
- OWASP Cloud Security - Enabling conversations through threat and control stories☆175Updated 5 years ago
- a ruggedization framework that embodies the principle "be mean to your code"☆978Updated 2 years ago
- Repo to hold mapping of user-security-stories☆112Updated 5 years ago
- threatspec - continuous threat modeling, through code☆327Updated 3 years ago
- Container Security Verification Standard☆57Updated 5 years ago
- This repository contains information about DevSecOps and how to get involved in this community effort.☆146Updated 5 years ago
- Application Security Automation☆522Updated last year
- An application to assist in the organization and prioritization of software security activities.☆134Updated 3 years ago
- Ready to use images of Zap and Glue, especially for CI integration.☆33Updated 5 years ago
- ☆478Updated last week
- OWASP Serverless Top 10☆212Updated 3 years ago
- Code examples for the AWS Security Blog post: How to use CI/CD to deploy and configure AWS security services with Terraform☆94Updated 3 years ago
- A small set of scripts to summarize AWS Security Groups, and generate visualizations of the rules.☆61Updated 4 years ago
- CIS Docker Benchmark - InSpec Profile☆482Updated last year
- ChaoSlingr: Introducing Security into Chaos Testing☆66Updated 5 years ago
- A simple tool for interacting with OWASP ZAP from the commandline.☆228Updated last year
- Learning Activities for the AWS Security Specialty Course☆82Updated 5 years ago
- Project intended to make Attack Maps part of software development by reducing the time it takes to complete them.☆46Updated 7 years ago
- Examples of integrating the Snyk CLI into a CI/CD system☆78Updated 5 months ago
- SAMM stands for Software Assurance Maturity Model.☆396Updated 2 years ago
- A Continuous Threat Modeling methodology☆303Updated 2 years ago
- Create custom auto-remediation solutions using serverless functions in the cloud.☆52Updated last year
- OWASP ServerlessGoat: a serverless application demonstrating common serverless security flaws☆312Updated last month
- This repository stores content that can be used to design a Rapid Threat Model Prototyping process for a software development group.☆154Updated last year
- for AWS Security material☆245Updated 2 years ago