mirswamp / deployment
SWAMP-in-a-Box
☆61Updated 4 years ago
Alternatives and similar repositories for deployment:
Users that are interested in deployment are comparing it to the libraries listed below
- Presentations, training modules, and other education materials from Duo Security's Application Security team.☆73Updated 3 years ago
- AppSecPipeline Specification for DevOps automation.☆40Updated 2 years ago
- Security Payload Unit Test Repository (SPUTR)☆86Updated 2 years ago
- OWASP Threat Dragon with Gitlab Integration☆25Updated 7 years ago
- A tool for testing continuous integration (CI) or continuous delivery (CD) system security☆23Updated 11 years ago
- Vendor Security Model Contract☆98Updated 2 years ago
- Pin designs for security related items☆37Updated 11 months ago
- A Java library for parsing and programmatically using threat models☆79Updated 2 years ago
- Content for 'JIRA Risk Project' book published at LeanPub☆57Updated 7 years ago
- Orchestron is an Application Vulnerability Management and Correlation Tool.Orchestron helps you solve one key problem "Find and fix vulne…☆31Updated 2 years ago
- ☆63Updated 2 years ago
- A Burp plugin to export findings to DefectDojo☆30Updated last year
- Tools for AWS forensics☆63Updated 9 years ago
- ☆20Updated 6 years ago
- Externalize Java application access to protected resources as log messages.☆41Updated 11 months ago
- ☆57Updated 4 years ago
- ☆25Updated 7 years ago
- Code Review Audit Script Scanner☆140Updated last year
- PrOfESSOS is our open source implementation for fully automated Evaluation-as-a-Service for SSO. PrOfESSOS introduces a generic approach …☆28Updated 2 years ago
- Project intended to make Attack Maps part of software development by reducing the time it takes to complete them.☆48Updated 8 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆63Updated 2 years ago
- Software Component Verification Standard (SCVS)☆143Updated 2 weeks ago
- A simple file-based scanner to look for potential AWS access and secret keys in files☆91Updated last year
- Scripts that we use for pentesting☆42Updated 8 years ago
- IriusRisk Community☆64Updated last year
- Continuous Integration and Development ExploiteR☆85Updated 2 years ago
- The OWASP ZAP Jenkins Plugin extends the functionality of the ZAP security tool into a CI Environment.☆60Updated 6 months ago
- Open Security Summit 2019☆26Updated 4 years ago
- Portcullis Computer Security Co-ordinated Disclosure Toolkit☆24Updated 4 years ago
- A community collection of security reviews of open source software components.☆93Updated last year