tldrsec / awesome-secure-defaultsLinks
Awesome secure by default libraries to help you eliminate bug classes!
☆700Updated last month
Alternatives and similar repositories for awesome-secure-defaults
Users that are interested in awesome-secure-defaults are comparing it to the libraries listed below
Sorting:
- Practical resources for offensive CI/CD security research. Curated the best resources I've seen since 2021.☆564Updated 2 months ago
- Gram is Klarna's own threat model diagramming tool☆329Updated this week
- This is a companion to the Security Engineer Questions☆204Updated 2 years ago
- Open source templates you can use to bootstrap your security programs☆885Updated 3 weeks ago
- boostsecurityio/poutine☆354Updated last week
- GitHub Actions Pipeline Enumeration and Attack Tool☆722Updated 4 months ago
- Websec interview questions by tib3rius answered☆307Updated 2 years ago
- GitHub Actions Goat: Deliberately Vulnerable GitHub Actions CI/CD Environment☆491Updated 7 months ago
- Detect and remediate misconfigurations and security risks across all your GitHub and GitLab assets☆827Updated 9 months ago
- CI/CD Security Analyzer☆728Updated 11 months ago
- ☆379Updated last year
- Cloud Commotion intends to cause chaos to simulate security incidents☆145Updated last year
- A built-to-be-vulnerable API application based on the OWASP top 10 API vulnerabilities. Use c{api}tal to learn, train and exploit API Sec…☆316Updated 5 months ago
- Create your own vulnerable by design AWS penetration testing playground☆428Updated 3 weeks ago
- RedFlag uses AI to identify high-risk code changes. Run it in batch mode for release candidate testing or in CI pipelines to flag PRs and…☆158Updated last year
- A simple threat modeling tool to help humans to reduce time-to-value when threat modeling☆663Updated this week
- A full insecure kubernetes application for testing security tools☆89Updated 3 months ago
- ☆192Updated 9 months ago
- Generate datasets of cloud audit logs for common attacks☆230Updated 2 weeks ago
- A curated list of Awesome Security Challenges.☆211Updated last year
- Customized CVE FEED Notifier☆114Updated 9 months ago
- OWASP Domain Protect - prevent subdomain takeover☆397Updated last year
- Documenting your Threat Models with HCL☆453Updated last month
- A comprehensive checklist and guide for organizations looking to implement a robust cybersecurity program☆46Updated last month
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆215Updated this week
- A collection of real-world threat model examples across various technologies, providing practical insights into identifying and mitigatin…☆475Updated 7 months ago
- Supply-Chain Firewall (SCFW) is a tool for preventing the installation of malicious npm and PyPI packages☆214Updated last week
- A curated list of resources about detecting threats and defending Kubernetes systems.☆402Updated 2 years ago
- Vulnerable app with examples showing how to not use secrets☆1,390Updated this week
- Use AI to Scan Your Code from the Command Line for security and code smells. Bring your own keys. Supports OpenAI and Gemini☆175Updated 9 months ago