philippnormann / security-beltLinks
๐ฅ Framework for continuously improving the IT-Security of your teams through gamification and self-assessment.
โ84Updated 3 years ago
Alternatives and similar repositories for security-belt
Users that are interested in security-belt are comparing it to the libraries listed below
Sorting:
- Proof of Value Terraform Scripts to utilize Amazon Web Services (AWS) Security, Identity & Compliance Services to Support your AWS Accounโฆโ16Updated 5 years ago
- Security Blueprint for Startupsโ39Updated 5 years ago
- โ๏ธHaven GRC - easier governance, risk, and compliance ๐จโโ๏ธ๐ฎโโ๏ธ๐ฆธโโ๏ธ๐ต๏ธโโ๏ธ๐ฉโ๐ฌโ103Updated 4 years ago
- INACTIVE - Collection of Tools & Procedures for double checking GitHub configurationsโ137Updated last year
- A project security/vulnerability/risk scanning toolโ362Updated 4 years ago
- โ84Updated 3 years ago
- An online multiplayer version of the Elevation of Privilege (EoP) threat modeling card gameโ156Updated 3 weeks ago
- โ191Updated last year
- Interrogate your GitHub resources with the help of the world's greatest detectives: Powerpipe + Steampipe + Sherlock.โ41Updated 4 months ago
- ๐๐ฅ KeyNuker - nuke AWS keys accidentally leaked to Githubโ90Updated 7 years ago
- Git plugin that prevents sensitive data from being committed.โ315Updated 5 years ago
- A web privacy measurement platformโ126Updated 4 years ago
- dangerzone has moved to https://github.com/freedomofpress/dangerzoneโ41Updated 4 years ago
- A simple JavaScript library to help you protect your users' passwordsโ149Updated 3 years ago
- A crowdsourced directory tracking the compliance and security practices of cloud services and their subprocessorsโ180Updated 4 years ago
- Git module to prevent from committing sensitive information into the repository.โ51Updated 8 years ago
- Monitors Github for leaked secretsโ203Updated last year
- A repository for wardley maps related to security topics.โ46Updated 8 years ago
- An interactive way to learn threat modelingโ17Updated 6 years ago
- Pin designs for security related itemsโ37Updated last year
- cloud.gov security policies and proceduresโ26Updated 6 months ago
- Static website for security.txt.โ68Updated 3 months ago
- Listo. Use questionnaires and checklists to make it easy to do the right thing, regarding the software you build.โ28Updated 2 years ago
- Want to test your applications using the latest OWASP security toolchains and the NIST National Vulnerability Database using Jenkins, Ansโฆโ55Updated 7 years ago
- Privacy Cards for Software Developersโ54Updated 6 years ago
- This is the public security policy of CISOfy, with extra resources like security tools.โ92Updated 5 years ago
- [DEPRECATED] A quickstart demo for Kolide toolsโ52Updated 7 years ago
- An attack tree generator built on electronโ62Updated 9 years ago
- Guidelines, principles published on https://infosec.mozilla.orgโ100Updated 4 months ago
- read the docs version of risk managementโ27Updated 2 years ago