-
-
Notifications
You must be signed in to change notification settings - Fork 311
Expand file tree
/
Copy pathproject_mediatext.json
More file actions
104 lines (104 loc) · 3.35 KB
/
project_mediatext.json
File metadata and controls
104 lines (104 loc) · 3.35 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
[
{
"name": "Amass",
"repo": "www-project-amass",
"shortname": "Amass",
"mediablurb": "Visualize your network attack surfaces and external assets"
},
{
"name": "Application Security Verification Standard",
"repo": "www-project-application-security-verification-standard",
"shortname": "ASVS",
"mediablurb": "The industry standard for web application security verification"
},
{
"name": "Cheat Sheets",
"repo": "www-project-cheat-sheets",
"shortname": "Cheat Sheets",
"mediablurb": "List of crucial app security information"
},
{
"name": "CycloneDX",
"repo": "www-project-cyclonedx",
"shortname": "CycloneDX",
"mediablurb": "BOM standard for advanced supply chain cybersecurity risk mitigation"
},
{
"name": "DefectDojo",
"repo": "www-project-defectdojo",
"shortname": "DefectDojo",
"mediablurb": "Leading vulnerability management platform for DevSecOps"
},
{
"name": "Dependency Check",
"repo": "www-project-dependency-check",
"shortname": "Dependency Check",
"mediablurb": "SCA tool suite to check for dependency vulnerabilities"
},
{
"name": "Dependency Track",
"repo": "www-project-dependency-track",
"shortname": "Dependency Track",
"mediablurb": "Component analysis platform to identify risks in the supply chain"
},
{
"name": "Juice Shop",
"repo": "www-project-juice-shop",
"shortname": "Juice Shop",
"mediablurb": "Modern and sophisticated intentionally non-secure web application"
},
{
"name": "Mobile App Security",
"repo": "www-project-mobile-app-security",
"shortname": "MAS",
"mediablurb": "The industry standard for mobile application security verification"
},
{
"name": "Modsecurity Core Rule Set",
"repo": "www-project-modsecurity-core-rule-set",
"shortname": "CRS",
"mediablurb": "Dominant Web Application Firewall rule set for ModSecurity and compatible WAFs"
},
{
"name": "Owtf",
"repo": "www-project-owtf",
"shortname": "OWTF",
"mediablurb": "Web testing framework for pentesters"
},
{
"name": "Samm",
"repo": "www-project-samm",
"shortname": "SAMM",
"mediablurb": "Software assurance maturity model to improve security posture"
},
{
"name": "Security Knowledge Framework",
"repo": "www-project-security-knowledge-framework",
"shortname": "SKF",
"mediablurb": "Security knowledge framework of secure coding principles"
},
{
"name": "Security Shepherd",
"repo": "www-project-security-shepherd",
"shortname": "Security Shepherd",
"mediablurb": "Web and mobile application training platform"
},
{
"name": "Top Ten",
"repo": "www-project-top-ten",
"shortname": "Top10",
"mediablurb": "Most critical security risks in web applications"
},
{
"name": "Web Security Testing Guide",
"repo": "www-project-web-security-testing-guide",
"shortname": "WSTG",
"mediablurb": "Testing resource for web application and security professionals"
},
{
"name": "ZAP",
"repo": "www-project-zap",
"shortname": "ZAP",
"mediablurb": "Highly popular web application security scanning tool"
}
]