product-security-group / Security_Ladders
Open source security career ladders
☆115Updated 2 years ago
Alternatives and similar repositories for Security_Ladders:
Users that are interested in Security_Ladders are comparing it to the libraries listed below
- ☆63Updated 2 years ago
- Presentations, training modules, and other education materials from Duo Security's Application Security team.☆73Updated 3 years ago
- Segment's Threat Modeling training for our engineers☆243Updated 3 years ago
- A MITRE ATT&CK Navigator export for AWS GuardDuty Findings☆137Updated 3 years ago
- 🖇️ STRIDE vs. ASVS equivalence table☆76Updated 8 months ago
- A unified DevSecOps Framework that allows you to go from iterative, collaborative Threat Modeling to Application Security Test Orchestrat…☆279Updated 3 weeks ago
- A small set of scripts to summarize AWS Security Groups, and generate visualizations of the rules.☆62Updated 4 years ago
- A place to gather and organize information about using threat modeling frameworks to deal with social conflict in online systems☆56Updated 2 weeks ago
- These are tools we released with our 2020 defcon/blackhat talk https://www.youtube.com/watch?v=Ml09R38jpok☆173Updated 2 months ago
- IAMFinder enumerates and finds users and IAM roles in a target AWS account.☆111Updated 4 years ago
- Remote Memory Acquisition Tool☆245Updated 4 years ago
- ☆32Updated 4 years ago
- ☆23Updated last year
- ☆20Updated 4 years ago
- ThreatModel for Amazon S3 - Library of all the attack scenarios on Amazon S3, and how to mitigate them following a risk-based approach☆153Updated last year
- A simple web app that helps developers understand the ASVS requirements.☆157Updated last month
- Security aspects of AWS products for the Security Specialist certification☆211Updated 2 years ago
- The Security Champion Framework provides both a measuring stick and a roadmap generator for Champion Programs.☆107Updated last year
- This repository stores content that can be used to design a Rapid Threat Model Prototyping process for a software development group.☆160Updated 2 years ago
- Python installable command line utiltity for mitigation of host and key compromises.☆346Updated 3 years ago
- A step-by-step walkthrough of CloudGoat 2.0 scenarios.☆134Updated 4 years ago
- A Continuous Threat Modeling methodology☆318Updated 2 years ago
- ☆123Updated last year
- for AWS Security material☆247Updated 3 years ago
- Repository for the Open Information Security Risk Universe☆63Updated 2 years ago
- ☆87Updated 3 years ago
- ☆370Updated last year
- materials we hand out☆143Updated 3 weeks ago
- Scripts to help work with configuration audit files☆85Updated 2 years ago
- Cloud Security Operations Orchestrator☆184Updated last year