kaakaww / workshop-github-actionsLinks
☆43Updated 3 years ago
Alternatives and similar repositories for workshop-github-actions
Users that are interested in workshop-github-actions are comparing it to the libraries listed below
Sorting:
- ☆101Updated last month
- Threat Modeling Manifesto☆29Updated last year
- A very vulnerable implementation of a GraphQL API.☆17Updated this week
- The Open Security Summit is focused on the collaboration between, Developers and Application Security☆45Updated 6 months ago
- OWASP Foundation Web Respository☆20Updated 3 months ago
- Collection of links to Security stuff☆117Updated 4 months ago
- OWASP Code Review Guide Web Repository☆148Updated 3 years ago
- ☆35Updated 4 years ago
- The Secure Coding Framework☆22Updated 5 years ago
- Desktop variant of OWASP Threat Dragon☆78Updated 4 years ago
- Vulnerable Task Manager☆20Updated last year
- A very vulnerable implementation of a GraphQL API.☆61Updated 4 years ago
- GCP GOAT is the vulnerable application for learn the GCP Security☆70Updated 8 months ago
- ZAP Management Scripts☆23Updated 2 weeks ago
- InfoSec OpenAI Examples☆19Updated 2 years ago
- A framework for understanding the capabilities of automated detection methods at identifying classes of application security vulnerabilit…☆32Updated last week
- A curated list of security tools for Hackers & Builders!☆98Updated last year
- Pin designs for security related items☆37Updated last year
- Presentations, training modules, and other education materials from Duo Security's Application Security team.☆76Updated 4 years ago
- OWASP Foundation Web Respository☆73Updated 3 weeks ago
- Offensive Terraform Website☆45Updated 5 years ago
- #legalbugbounty project — creating safe harbors on bug bounty programs and vulnerability disclosure programs. Authored by Amit Elazari.☆73Updated 6 years ago
- CLI component of OWASP PurpleTeam☆133Updated 2 years ago
- ☆37Updated 10 months ago
- Tools to automate AWS Cloud security assessments☆24Updated 5 years ago
- Kubernetes Security Testing Guide☆26Updated last year
- Puma Prey contains vulnerable .NET target applications to test the Puma Scan rules against. This project contains Web Forms, MVC5, and Co…☆21Updated 4 months ago
- ZAP scripts to implement ASVS L1 checking☆16Updated 3 years ago
- Given a list of domains and known IP and buckets that are owned, which might be susceptible to domain hijacking?☆15Updated last year
- A community collection of security reviews of open source software components.☆96Updated last year