Welcome to OpenDevSecOps! Our mission is to deliver highly-resilient, readily-available and free defensive and offensive devops security solutions to organisations large and small.
☆21Jan 29, 2019Updated 7 years ago
Alternatives and similar repositories for lobby
Users that are interested in lobby are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Terraform module which provides easy to configure AWS environment for running automated security scanning solutions at scheduled interval…☆45Jan 29, 2019Updated 7 years ago
- Open Security Summit 2018☆29Nov 16, 2020Updated 5 years ago
- Repo to hold the markdown-ified metadata on AppSec tools that are automation-friendly☆12Jun 13, 2016Updated 9 years ago
- DevSecOps Working Group☆12Sep 24, 2019Updated 6 years ago
- ☆18Sep 4, 2017Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Docker container for Zachary Rice Gitleaks☆20Aug 16, 2019Updated 6 years ago
- Mixeway is security orchestrator for vulnerability scanners which enable easy plug in integration with CICD pipelines. MixewayBackend pro…☆17Sep 26, 2024Updated last year
- Pown Proxy is a versatile web application security testing proxy with cool TUI features.☆60May 16, 2019Updated 6 years ago
- Reviews and tests of security products☆17Dec 28, 2024Updated last year
- ☆14Jun 7, 2017Updated 8 years ago
- Open Security Summit 2019☆26Nov 16, 2020Updated 5 years ago
- Base infrastructure for future DevSecOps environment in AWS☆25Oct 21, 2020Updated 5 years ago
- Find faces in photo using Rustface.☆14Nov 4, 2022Updated 3 years ago
- ☆16Oct 29, 2018Updated 7 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Puma Prey contains vulnerable .NET target applications to test the Puma Scan rules against. This project contains Web Forms, MVC5, and Co…☆21Updated this week
- Sample that illustrates using Azure KeyVault for Key Management to wrap / unwrap one-time use symmetric keys for encrypting serialized da…☆11May 24, 2017Updated 8 years ago
- ☆11Mar 9, 2018Updated 8 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆25Nov 7, 2017Updated 8 years ago
- AppSecPipeline Specification for DevOps automation.☆40Dec 8, 2022Updated 3 years ago
- Build locally, deploy to any cloud, Automate all configurations...☆17Mar 25, 2020Updated 6 years ago
- A collection of Docker and Kubernetes resources☆18Nov 14, 2022Updated 3 years ago
- Content for cyber defense course☆14Oct 15, 2014Updated 11 years ago
- Burp extension to decode NTLM SSP headers and extract domain/host information☆31Mar 11, 2021Updated 5 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Exploit Research & Development - Ported Exploits☆11Jul 22, 2017Updated 8 years ago
- Unifi Dream Machine Instructions☆35Nov 20, 2021Updated 4 years ago
- A Helm chart that deploys a web app defined in docker-compose.yml to Kubernetes☆13Mar 28, 2018Updated 8 years ago
- A library to access to basic functions of hardware cryptocurrencies wallets☆10Mar 17, 2019Updated 7 years ago
- Simple socket-based gateway to the Burp Collaborator☆34Nov 23, 2016Updated 9 years ago
- Tool for automatic switching on/off LED of UDM☆15Oct 8, 2021Updated 4 years ago
- Automated Google dorking with custom search engines☆26May 2, 2020Updated 5 years ago
- Docker container bundling tools for manual AWS security reviews☆12Sep 12, 2018Updated 7 years ago
- Lightweight and extensible horizontal vulnerability scanner☆11Dec 8, 2022Updated 3 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- A curated collection of tools and resources for building security with a developer first approach.☆30Jul 29, 2022Updated 3 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆11May 25, 2019Updated 6 years ago
- Wireshark regression tests☆11Jan 21, 2021Updated 5 years ago
- URL-encode data streams via commandline☆14Oct 26, 2019Updated 6 years ago
- This is an offensive guide to securing AWS infrastructures. The hope is that by knowing how to take advantage of various types of AWS wea…☆174Mar 1, 2019Updated 7 years ago
- A repository for wardley maps related to security topics.☆46Feb 15, 2017Updated 9 years ago
- Docker images of Dalibo's projects☆10Aug 16, 2019Updated 6 years ago