NCSC Guidance for secure development and deployment
☆443Nov 23, 2017Updated 8 years ago
Alternatives and similar repositories for secure-development-and-deployment
Users that are interested in secure-development-and-deployment are comparing it to the libraries listed below
Sorting:
- Principles to help you design and deploy a zero trust architecture☆1,697Apr 25, 2023Updated 2 years ago
- Pointers to useful, well-written, and otherwise beautiful documentation.☆9,461Updated this week
- Awesome online talks and screencasts☆6,193Jul 7, 2025Updated 8 months ago
- Questions to ask the company during your interview☆28,503Feb 19, 2025Updated last year
- Manually curated collection of resources for frontend web developers.☆46,150May 21, 2024Updated last year
- Logging Made Easy☆710Nov 1, 2023Updated 2 years ago
- Public rules and samples for various automations through LimaCharlie.io☆14Dec 16, 2021Updated 4 years ago
- Ansible roles for managing system patching☆18Dec 8, 2014Updated 11 years ago
- ☆23Mar 18, 2022Updated 3 years ago
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- 👩💻👨💻 Awesome cheatsheets for popular programming languages, frameworks and development tools. They include everything you should kn…☆45,454Feb 20, 2026Updated 2 weeks ago
- All Day DevOps - Automated Infrastructure Security Monitoring and Defence (ELK + AWS Lambda)☆25Dec 7, 2016Updated 9 years ago
- Crowdsourced event coverage system developed by Pittsburgh IndyMedia during the G20. Incorporates twitter, flickr, google maps, podcast…☆25Feb 15, 2010Updated 16 years ago
- Set of scripts to index PCAP files and retrieve packets☆14Sep 10, 2015Updated 10 years ago
- Assess certain AWS network configurations☆12Aug 22, 2018Updated 7 years ago
- Java client for Hawkular☆11Mar 16, 2017Updated 8 years ago
- A generic monitoring client☆14May 17, 2012Updated 13 years ago
- Curated list of design and UI resources from stock photos, web templates, CSS frameworks, UI libraries, tools and much more☆64,945Jan 31, 2026Updated last month
- Some useful websites for programmers.☆75,786Sep 16, 2025Updated 5 months ago
- Simplifying Seccomp enforcement in containerized or non-containerized apps☆112Oct 29, 2020Updated 5 years ago
- Collection of Semgrep rules for security analysis☆10Mar 30, 2024Updated last year
- ☆32Jun 3, 2019Updated 6 years ago
- ☆77Oct 16, 2022Updated 3 years ago
- Pam based webhook authentication for Kubernetes☆79Aug 23, 2020Updated 5 years ago
- Data for CyberSOCEval, an LLM benchmark by Meta & CrowdStrike☆20Sep 22, 2025Updated 5 months ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Apr 18, 2020Updated 5 years ago
- Native Android software for dumping memory from Android processes☆14Sep 18, 2014Updated 11 years ago
- my .chef/plugins/knife/☆27Jan 9, 2013Updated 13 years ago
- ☆75Apr 12, 2018Updated 7 years ago
- ☆19Jul 28, 2025Updated 7 months ago
- A toolkit for Kubernetes cluster provisioning and lifecycle management☆264Aug 6, 2019Updated 6 years ago
- Repository for Endpoint Security Testing☆35Jul 26, 2018Updated 7 years ago
- Checks for the Datadog Agent that Stripe finds useful.☆101Jan 7, 2021Updated 5 years ago
- ☆16Apr 30, 2023Updated 2 years ago
- 🛡 Monitor, analyze, & report security misconfigurations across environments.☆18Oct 26, 2017Updated 8 years ago
- Corelight-Ansible-Roles are a collection of Ansible Roles and playbooks that install, configure, run and manage a variety of Corelight, S…☆16Jun 15, 2021Updated 4 years ago
- Kubernetes Acceptance Testing tool☆17Sep 13, 2019Updated 6 years ago
- INACTIVE - http://mzl.la/ghe-archive - Unit Tests for your Network -☆44Mar 29, 2019Updated 6 years ago
- Network security testing for Kubernetes DevSecOps workflows☆384Feb 19, 2026Updated 2 weeks ago