jcavell / security-guide-for-developersLinks
☆22Updated 6 years ago
Alternatives and similar repositories for security-guide-for-developers
Users that are interested in security-guide-for-developers are comparing it to the libraries listed below
Sorting:
- ☆84Updated 3 years ago
- A continuous security pipeline demo for the AWS DevSecOps Workshop.☆45Updated 6 years ago
- ☆23Updated 3 years ago
- Creates a CloudFormation stack for running Security Monkey☆27Updated 6 years ago
- The Docker Bench for Security is a script that checks for dozens of common best-practices around deploying Docker containers in productio…☆22Updated 10 years ago
- Curated & Must Read Content For DevOps, SysAdmins & Fullstack Developers.☆140Updated 9 years ago
- Presentation: Intro to Docker☆34Updated 7 years ago
- VisualOps via Jenkins jobs☆21Updated 8 years ago
- ☆14Updated 8 years ago
- Proof of Value Terraform Scripts to utilize Amazon Web Services (AWS) Security, Identity & Compliance Services to Support your AWS Accoun…☆16Updated 5 years ago
- The Packer Book code☆29Updated 8 years ago
- NodeSS: Node.js Security Scanner : This container will scan your Nodejs code for dependency vulnerabilities, print the result and exits☆23Updated 9 years ago
- Defcon24 Workshop Contents : Ninja Level Infrastructure Monitoring☆126Updated 9 years ago
- An Incident Management Process / Post Mortem Template☆31Updated 7 years ago
- A terraform module providing an opinionated Consul cluster built on an ECS cluster in AWS.☆15Updated 5 years ago
- ☆21Updated 7 years ago
- ☆77Updated 2 years ago
- ZAP Management Scripts☆23Updated last week
- OWASP SonarQube Project☆111Updated 6 years ago
- Auditing & Hardening script for Kubernetes☆46Updated 7 years ago
- Backendless security monitoring for your MFA enabled services. 🔐☆44Updated 8 years ago
- Sample cross-platform Web Application Firewall, used as a security proxy for existing web apps☆15Updated 8 years ago
- A curl Cheat Sheet tailored for playing with APIs☆21Updated 11 years ago
- Want to test your applications using the latest OWASP security toolchains and the NIST National Vulnerability Database using Jenkins, Ans…☆56Updated 7 years ago
- ☆38Updated 3 years ago
- Example repo from Infrastructure As Code Tutorial☆75Updated 7 years ago
- Infrastructure as Code (IAC) Cookbook by Packt☆39Updated 4 years ago
- Elasticsearch, Logstash and Kibana Containers☆12Updated 3 years ago
- this is a demo set of attacks that can be used to get started with gauntlt☆27Updated 10 years ago
- The Open Security Summit 2020 is focused on the collaboration between, Developers and Application Security☆25Updated 5 years ago