βΎοΈ Collection and Roadmap for everyone who wants DevSecOps. Hope your DevOps are more safe π
β2,101Mar 3, 2026Updated last month
Alternatives and similar repositories for DevSecOps
Users that are interested in DevSecOps are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Curating the best DevSecOps resources and tooling.β1,656Aug 2, 2024Updated last year
- Ultimate DevSecOps libraryβ6,665Mar 5, 2026Updated last month
- This is a step-by-step guide to implementing a DevSecOps program for any size organizationβ2,039Dec 21, 2024Updated last year
- An authoritative list of awesome devsecops tools with the help from community experiments and contributions.β5,367May 11, 2024Updated last year
- The OWASP DevSecOps Guideline can help us to embedding security as a part of the development pipeline.β1,045Jan 5, 2026Updated 3 months ago
- Wordpress hosting with auto-scaling on Cloudways β’ AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Collection of Cloud and DevSecOps learning resourcesβ485Jul 22, 2021Updated 4 years ago
- Checklist for container security - devsecops practicesβ1,615Sep 15, 2025Updated 6 months ago
- Complete Practical Study Plan to become a successful cybersecurity engineer based on roles like Pentest, AppSec, Cloud Security, DevSecOpβ¦β4,917Dec 31, 2025Updated 3 months ago
- A curated list of threat modeling resources (Books, courses - free and paid, videos, tools, tutorials and workshops to practice on ) for β¦β1,736Aug 2, 2024Updated last year
- Azure and AWS Attacksβ1,116Nov 25, 2022Updated 3 years ago
- βοΈ Web Hacker's Weapons / A collection of cool tools used by Web hackers. Happy hacking , Happy bug-huntingβ4,563Mar 20, 2026Updated 2 weeks ago
- π‘οΈ Awesome Cloud Security Resources βοΈβ2,388Mar 17, 2026Updated 3 weeks ago
- Curated list of links, references, books videos, tutorials (Free or Paid), Exploit, CTFs, Hacking Practices etc. which are related to AWSβ¦β1,541Updated this week
- Kubernetes Goat is a "Vulnerable by Design" cluster environment to learn and practice Kubernetes security using an interactive hands-on pβ¦β5,574Mar 25, 2026Updated 2 weeks ago
- Proton VPN Special Offer - Get 70% off β’ AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A collection of awesome API Security tools and resources. The focus goes to open-source tools and resources that benefit all the communitβ¦β3,714Nov 23, 2025Updated 4 months ago
- A curated list of awesome cloud security blogs, podcasts, standards, projects, and examples.β662May 20, 2025Updated 10 months ago
- A deliberately vulnerable CI/CD environment. Learn CI/CD security through multiple challenges.β2,218Jul 14, 2024Updated last year
- Automating situational awareness for cloud penetration tests.β2,335Mar 24, 2026Updated 2 weeks ago
- Open-Source Unified Vulnerability Management, DevSecOps & ASPMβ4,612Updated this week
- ππ¦ Dalfox is a powerful open-source XSS scanner and utility focused on automation.β4,918Updated this week
- A collection of awesome security hardening guides, tools and other resourcesβ6,256Mar 20, 2026Updated 2 weeks ago
- A open contribute bootcamp to develop DevSecOps skills...β783Sep 18, 2023Updated 2 years ago
- OSWE, OSEP, OSED, OSEEβ3,794Jan 2, 2026Updated 3 months ago
- DigitalOcean Gradient AI Platform β’ AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Mind-Maps of Several Thingsβ2,634Jun 29, 2023Updated 2 years ago
- AWSGoat : A Damn Vulnerable AWS Infrastructureβ2,000May 20, 2025Updated 10 months ago
- A curated list for Awesome Kubernetes Security resourcesβ1,995Mar 30, 2026Updated last week
- Threat matrix for CI/CD Pipelineβ761Jul 8, 2024Updated last year
- All about bug bounty (bypasses, payloads, and etc)β6,685Sep 8, 2023Updated 2 years ago
- Awesome free cloud native security learning labs. Includes CTF, self-hosted workshops, guided vulnerability labs, and research labs.β1,922Oct 1, 2025Updated 6 months ago
- Kubernetes Security Checklist and Requirements - All in One (authentication, authorization, logging, secrets, configuration, network, worβ¦β486Dec 13, 2021Updated 4 years ago
- A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-referenceβ5,604Aug 6, 2023Updated 2 years ago
- List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc.β9,427Oct 16, 2025Updated 5 months ago
- Simple, predictable pricing with DigitalOcean hosting β’ AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- π Authz0 is an automated authorization test tool. Unauthorized access can be identified based on URLs and Roles & Credentials.β427Feb 20, 2026Updated last month
- Granular, Actionable Adversary Emulation for the Cloudβ2,289Apr 2, 2026Updated last week
- This repository contains a collection of cheatsheets I have put together for tools related to pentesting organizations that leverage clouβ¦β2,807Sep 17, 2024Updated last year
- Nuclei is a fast, customizable vulnerability scanner powered by the global security community and built on a simple YAML-based DSL, enablβ¦β27,799Updated this week
- β758Aug 26, 2022Updated 3 years ago
- Find, verify, and analyze leaked credentialsβ25,338Updated this week
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.β1,900Oct 29, 2025Updated 5 months ago