gauntlt / gauntlt-dockerLinks
the docker for gauntlt
☆86Updated 2 years ago
Alternatives and similar repositories for gauntlt-docker
Users that are interested in gauntlt-docker are comparing it to the libraries listed below
Sorting:
- example code and lab environment for the the Security Testing class in the Lynda and LinkedIn Learning library☆85Updated 6 years ago
- Node application to help managing Maturity Models like the ones created by BSIMM and OpenSAMM☆194Updated 6 years ago
- Repo to hold mapping of user-security-stories☆120Updated 6 years ago
- a ruggedization framework that embodies the principle "be mean to your code"☆989Updated 2 years ago
- OWASP Cloud Security - Enabling conversations through threat and control stories☆180Updated 6 years ago
- A unified DevSecOps Framework that allows you to go from iterative, collaborative Threat Modeling to Application Security Test Orchestrat…☆279Updated last week
- An application to assist in the organization and prioritization of software security activities.☆139Updated 3 years ago
- threatspec - continuous threat modeling, through code☆357Updated 4 years ago
- Ready to use images of Zap and Glue, especially for CI integration.☆35Updated 6 years ago
- SAMM stands for Software Assurance Maturity Model.☆397Updated 3 years ago
- CIS Docker Benchmark - InSpec Profile☆507Updated 2 years ago
- Application Security Automation☆529Updated last year
- This repository stores content that can be used to design a Rapid Threat Model Prototyping process for a software development group.☆161Updated 2 years ago
- ChaoSlingr: Introducing Security into Chaos Testing☆68Updated 6 years ago
- A Continuous Threat Modeling methodology☆319Updated 2 years ago
- ☆526Updated last week
- InSpec profile to validate your VPC to the standards of the CIS Amazon Web Services Foundations Benchmark☆78Updated 5 months ago
- This repository contains information about DevSecOps and how to get involved in this community effort.☆150Updated 6 years ago
- Project intended to make Attack Maps part of software development by reducing the time it takes to complete them.☆48Updated 8 years ago
- Code examples for the AWS Security Blog post: How to use CI/CD to deploy and configure AWS security services with Terraform☆96Updated 3 years ago
- Helm chart to deploy Trend Micro Deep Security Smart Check.☆44Updated last year
- CIS Kubernetes Benchmark - InSpec Profile☆302Updated 9 months ago
- A small set of scripts to summarize AWS Security Groups, and generate visualizations of the rules.☆62Updated 4 years ago
- Container Security Verification Standard☆58Updated 5 years ago
- This repository will teach you have to do my talk "Pushing Left, Like a Boss".☆70Updated 3 years ago
- Create custom auto-remediation solutions using serverless functions in the cloud.☆53Updated last year
- ☆108Updated last year
- OWASP Serverless Top 10☆217Updated 3 years ago
- A simple tool for interacting with OWASP ZAP from the commandline.☆238Updated 2 years ago
- For engineers and security teams driving fast and secure software supply chains☆83Updated 2 years ago