philippnormann / security-beltLinks
๐ฅ Framework for continuously improving the IT-Security of your teams through gamification and self-assessment.
โ84Updated 2 years ago
Alternatives and similar repositories for security-belt
Users that are interested in security-belt are comparing it to the libraries listed below
Sorting:
- INACTIVE - Collection of Tools & Procedures for double checking GitHub configurationsโ136Updated last year
- A project security/vulnerability/risk scanning toolโ362Updated 4 years ago
- โ๏ธHaven GRC - easier governance, risk, and compliance ๐จโโ๏ธ๐ฎโโ๏ธ๐ฆธโโ๏ธ๐ต๏ธโโ๏ธ๐ฉโ๐ฌโ103Updated 4 years ago
- An online multiplayer version of the Elevation of Privilege (EoP) threat modeling card gameโ147Updated 3 months ago
- ๐๐ฅ KeyNuker - nuke AWS keys accidentally leaked to Githubโ90Updated 7 years ago
- Interrogate your GitHub resources with the help of the world's greatest detectives: Powerpipe + Steampipe + Sherlock.โ41Updated 3 months ago
- โ192Updated last year
- Security Blueprint for Startupsโ39Updated 5 years ago
- โ84Updated 3 years ago
- A repository for wardley maps related to security topics.โ46Updated 8 years ago
- A web privacy measurement platformโ126Updated 4 years ago
- cloud.gov security policies and proceduresโ25Updated 5 months ago
- An Incident Management Process / Post Mortem Templateโ31Updated 7 years ago
- Git plugin that prevents sensitive data from being committed.โ315Updated 5 years ago
- Want to test your applications using the latest OWASP security toolchains and the NIST National Vulnerability Database using Jenkins, Ansโฆโ55Updated 7 years ago
- An actuary is a business professional who analyzes the financial consequences of risk.โ81Updated 8 years ago
- Proof of Value Terraform Scripts to utilize Amazon Web Services (AWS) Security, Identity & Compliance Services to Support your AWS Accounโฆโ16Updated 5 years ago
- Project intended to make Attack Maps part of software development by reducing the time it takes to complete them.โ48Updated 8 years ago
- The original AWS security enforcerโขโ61Updated 6 years ago
- An interactive way to learn threat modelingโ17Updated 6 years ago
- Content-Security-Policy report aggregator/analyzerโ54Updated 5 years ago
- A Java library for programmatically calculating OWASP Risk Rating scoresโ18Updated 2 years ago
- A Dockerfile that creates an image with known vulnerabilities.โ50Updated 3 years ago
- Open Source Policy Examples and Templatesโ191Updated 2 years ago
- Public version of PagerDuty's employee security training courses.โ414Updated 2 years ago
- Git module to prevent from committing sensitive information into the repository.โ43Updated 6 years ago
- Qualys sslabs-scan utility in a tiny docker imageโ121Updated last year
- AWS Lambda Infection Toolkit // Persistent Lambda Malware PoCโ159Updated 8 years ago
- Pin designs for security related itemsโ37Updated last year
- AWS Metadata Proxy for protection against SSRFโ68Updated 5 years ago