mickesv / ProvisioningDeploymentLinks
Code and Documentation for part of a course on Applied Cloud Computing and Big Data
☆16Updated 6 months ago
Alternatives and similar repositories for ProvisioningDeployment
Users that are interested in ProvisioningDeployment are comparing it to the libraries listed below
Sorting:
- Rejoinderoo creates a rejoinder (response to reviewers) LaTeX document based on a spreadsheet file.☆25Updated 3 weeks ago
- ☆11Updated last month
- Git tutorial☆16Updated 11 months ago
- An extensive list of resources related to threat modelling. Gotta catch ’em all!☆40Updated last month
- Useful tools and Examples made by Checkmarx Professional Services☆39Updated 3 months ago
- Python package for functions around the causality in requirements artifacts (CiRA) initiative.☆13Updated last year
- Demos for our research on Github actions script injection vulnerabilities☆13Updated last year
- ☆195Updated 2 years ago
- Practical resources for offensive CI/CD security research. Curated the best resources I've seen since 2021.☆564Updated 2 months ago
- A Broken Application - Very Vulnerable!☆180Updated this week
- Damn Simple Vulnerable Python Web Application☆18Updated last year
- NextJS-based single-page application for completing and reviewing SAMM assessments☆78Updated 2 years ago
- Deadline countdowns for academic conferences in Software Engineering☆67Updated this week
- How GitHub Actions workflows can be hacked☆175Updated last year
- The Security Champion Framework provides both a measuring stick and a roadmap generator for Champion Programs.☆110Updated last year
- A built-to-be-vulnerable API application based on the OWASP top 10 API vulnerabilities. Use c{api}tal to learn, train and exploit API Sec…☆315Updated 4 months ago
- A curated list of Awesome Security Challenges.☆206Updated last year
- SecHub provides a central API to test software with different security tools.☆356Updated 2 weeks ago
- GitHub Actions Goat: Deliberately Vulnerable GitHub Actions CI/CD Environment☆488Updated 6 months ago
- Tools and standards for conducting and evaluating research in software engineering☆319Updated 4 months ago
- Github action to run dependency check☆93Updated last month
- OWASP Foundation Web Respository☆22Updated 3 months ago
- Purposely vulnerable Java application to help lead secure coding workshops☆192Updated last year
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆177Updated last month
- OWASP VulnerableApp Project: For Security Enthusiasts by Security Enthusiasts.☆354Updated last week
- A comprehensive list of software composition analysis tools.☆159Updated 2 months ago
- Octoscan is a static vulnerability scanner for GitHub action workflows.☆241Updated last month
- A comprehensive checklist and guide for organizations looking to implement a robust cybersecurity program☆45Updated 3 weeks ago
- A security tool that detects malicious packages from external vulnerability feeds and searches for them in your package registries or art…☆70Updated last month
- Xipher is a curated collection of cryptographic primitives put together to perform key/password based asymmetric encryption☆11Updated 3 weeks ago