gwensmu's Stars
moov-io/metro2
Open Source Metro 2 consumer credit history report for credit report file creation and validation
mikker/passwordless
🗝 Authentication for your Rails app without the icky-ness of passwords
meichlseder/pyascon
ascon/ascon_collection
A collection of Ascon implementations & documents (as submodules)
projectdiscovery/subfinder
Fast passive subdomain enumeration tool.
EdOverflow/can-i-take-over-xyz
"Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records.
mandatoryprogrammer/xsshunter
The XSS Hunter service - a portable version of XSSHunter.com
nathants/mighty-snitch
noticing and preventing network requests should be easy
UnityTech/unity-ssdlc
A public version of Unity's internal SSDLC. Meant to provide an example framework, not just to share with others, but to also take contributions and continue to improve and evolve.
OWASP/www-project-kubernetes-top-ten
OWASP Foundation Web Respository
DataDog/threatest
Threatest is a CLI and Go framework for end-to-end testing threat detection rules.
rob-derosa/pii-detection
A GitHub action to detect PII (phone, email, SSN, IP, etc) in issues, pull requests and comments
PacktPublishing/Learn-Kubernetes-Security
Learn Kubernetes Security, published by Packt
awslabs/aws-automated-incident-response-and-forensics
security-prince/Application-Security-Engineer-Interview-Questions
Some of the questions which i was asked when i was giving interviews for Application/Product Security roles. I am sure this is not an exhaustive list but i felt these questions were important to be asked and some were challenging to answer
projectdiscovery/nuclei
Fast and customizable vulnerability scanner based on simple YAML based DSL.
picatz/shodanz
🔭 A modern, async Ruby gem for Shodan.
saml-to/assume-aws-role-action
Assume AWS IAM Roles using SAML.to in GitHub Actions
RichiH/vcsh
config manager based on Git
danielmiessler/SecLists
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
docker/docker-bench-security
The Docker Bench for Security is a script that checks for dozens of common best-practices around deploying Docker containers in production.
dwave-examples/maze
Simple example on how to construct a problem for a quantum computer
bugarela/tla-transmutation
Elixir code and test generation from TLA+ specifications
kit-dsn/payment-channel-tla
Specification of a protocol for payment channels in TLA+
pulumi/pulumi
Pulumi - Infrastructure as Code in any programming language 🚀
johnkerl/miller
Miller is like awk, sed, cut, join, and sort for name-indexed data such as CSV, TSV, and tabular JSON
dandavison/delta
A syntax-highlighting pager for git, diff, grep, and blame output
hashicorp/boundary
Boundary enables identity-based access management for dynamic infrastructure.
slsa-framework/slsa
Supply-chain Levels for Software Artifacts
awslabs/aws-shell
An integrated shell for working with the AWS CLI.