ocatak / apache-http-logsLinks
to detect vulnerability scans, XSS and SQLI attacks, examine access log files for detections.
☆14Updated 4 years ago
Alternatives and similar repositories for apache-http-logs
Users that are interested in apache-http-logs are comparing it to the libraries listed below
Sorting:
- A deliberately vulnerable java app for educational purposes☆19Updated last year
- Secure Software Development Fundamentals courses (from the OpenSSF Best Practices WG)☆199Updated last month
- Threat model for Amazon S3 - Library of all the attack scenarios on Amazon S3, and how to mitigate them following a risk-based approach☆157Updated 2 years ago
- OWASP Foundation Web Repository☆47Updated last month
- Summaries, transcripts, key points, and other useful insights from AWS re:inforce 2025 talks for those of us who don't have time to watch…☆103Updated 7 months ago
- A unified DevSecOps Framework that allows you to go from iterative, collaborative Threat Modeling to Application Security Test Orchestrat…☆280Updated this week
- Software Component Verification Standard (SCVS)☆153Updated 10 months ago
- OWASP ServerlessGoat: a serverless application demonstrating common serverless security flaws☆328Updated last year
- An AI-powered tool for discovering privilege escalation opportunities in AWS IAM configurations.☆117Updated this week
- https://breaches.cloud☆42Updated last year
- Cloud Commotion intends to cause chaos to simulate security incidents☆145Updated last year
- Shostack's 4 Question Frame for Threat Modeling☆161Updated last month
- AWS Certified Security Specialty (2020) course notes☆121Updated 5 years ago
- Sample DevSecOps pipelines (heavily biased on the "Sec") for various stacks and tools using open-source security tools and AWS native ser…☆72Updated 4 years ago
- A curated list of threat modeling resources (Books, courses - free and paid, videos, tools, tutorials and workshops to practice on ) for …☆18Updated last year
- This repository stores content that can be used to design a Rapid Threat Model Prototyping process for a software development group.☆165Updated 2 years ago
- Adaptive AWS Zero Trust Policy made easy: Auto-generate least-privilege policies based on user activity in real time! Accelerate the adop…☆76Updated last year
- A curated list of policy-as-code resources like blogs, videos, and tools to practice on for learning Policy-as-Code.☆204Updated 2 years ago
- The SOCless automation framework☆140Updated 11 months ago
- GitHub Actions Goat: Deliberately Vulnerable GitHub Actions CI/CD Environment☆493Updated 7 months ago
- A full insecure kubernetes application for testing security tools☆90Updated 3 months ago
- intentionally vuln web Application Security in django☆302Updated last week
- Threat Designer is a GenerativeAI application designed to automate and streamline the threat modeling process for secure system design.☆189Updated this week
- A list of cloud security tools and vendors.☆184Updated last year
- ☆97Updated last year
- Coalfire AWS RAMP/pak Reference Architecture☆37Updated last year
- The Security Champion Framework provides both a measuring stick and a roadmap generator for Champion Programs.☆110Updated 2 years ago
- This repository will teach you got to present my talk "Security is everybody's job", a talk about DevSecOps.☆27Updated 3 years ago
- OWASP Foundation Project Web Repository for Secure Coding Practices Quick-reference Guide☆71Updated last year
- ☆89Updated 4 months ago