implementation of some secure design patterns with explanation
-
Updated
Jun 10, 2024 - Java
implementation of some secure design patterns with explanation
Templates for the Microsoft Threat Modeling Tool
A Pythonic framework for threat modeling
OWASP Foundation project Threat Dragon
Just like chess puzzles, but with code
Материалы к вебинару «Как выстроить процесс безопасной разработки в Yandex Cloud».
Self-service SDLC and maturity measurement
This repository hosts DSP AppSec internal infrastructure apps deployed in GKE.
♾️ Collection of DevSecOps Notes + Resources + Courses + Tools
AI-driven Threat modeling-as-a-Code (TaaC-AI)
Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. Sugar-Free and Secure: no any external dependencies except for chart plotting are used
Principios e Boas Práticas sobre Desenvolvimento Seguro
A Continuous Threat Modeling methodology
A Collection of Secure Mobile Development Best Practices
A Pythonic framework for threat modeling
Add a description, image, and links to the secure-development topic page so that developers can more easily learn about it.
To associate your repository with the secure-development topic, visit your repo's landing page and select "manage topics."