django-DefectDojo
aws-secure-environment-accelerator
Our great sponsors
django-DefectDojo | aws-secure-environment-accelerator | |
---|---|---|
6 | 4 | |
3,384 | 711 | |
2.8% | 1.4% | |
9.9 | 7.2 | |
7 days ago | 15 days ago | |
HTML | HTML | |
BSD 3-clause "New" or "Revised" License | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
django-DefectDojo
- Any open source projects where we can learn Django by doing?
-
Open Source Django Projects for Study
DefectDojo is a DevSecOps and vulnerability management tool used by many organisations. I learned a lot from this project.
-
Running DefectDojo as a Swarm Stack?
I see they have a fairly comprehensive helm chart, which might be easier to wrangle than building (and then continuing to maintain!) a swarm compose stack. If you're not averse to Kubernetes, you could quickly deploy k3s and run their chart that way?
-
django-DefectDojo VS faraday - a user suggested alternative
2 projects | 5 Apr 2022
- DefectDojo
aws-secure-environment-accelerator
-
An AWS account just for getting into other AWS accounts
https://github.com/aws-samples/aws-secure-environment-accele...
I've used the ASEA to get a number of organizations setup. I prefer it to Control Tower (it can be installed on top of CT). The ASEA is open source and written in AWS cdk so it can be forked and modified if needed.
- Managing AWS in a Large Organization: Looking for best practices and experience.
-
Multi-account with AWS Organization + VPN server access to multiple VPC/regions: best practices?
Hey ! If you plan to create a new Landing zone, take a look at Control Tower, or this Env Accelerator you can also do it with Terraform.
-
AWS Control Tower Advice
We are more interested in https://github.com/aws-samples/aws-secure-environment-accelerator which seems to be a way better successor to the original landing zone solution. Nearly all CDK and highly customisable. Just need a fresh new environment to deploy it into and test! By the looks of their commit history it seems they also thought of it as a better control tower before being told to change the wording.
What are some alternatives?
faraday - Open Source Vulnerability Management Platform
cfn_nag - Linting tool for CloudFormation templates
secureCodeBox - secureCodeBox (SCB) - continuous secure delivery out of the box
trailscraper - A command-line tool to get valuable information out of AWS CloudTrail
endoflife.date - Informative site with EoL dates of everything
panther - [DEPRECATED] Detect threats with log data and improve cloud security posture
vapi - vAPI is Vulnerable Adversely Programmed Interface which is Self-Hostable API that mimics OWASP API Top 10 scenarios through Exercises.
CapRover - Scalable PaaS (automated Docker+nginx) - aka Heroku on Steroids
multi-juicer - Host and manage multiple Juice Shop instances for security trainings and Capture The Flags
Completion-n-Queens-Problem - A linear algorithm is described for solving the n-Queens Completion problem for an arbitrary composition of k queens, consistently distributed on a chessboard of size n x n. Two important rules are used in the algorithm: a) the rule of sequential risk elimination for the entire system as a whole; b) the rule of formation of minimal damage in the given selection conditions. For any composition of k queens (1<= k<n), a solution is provided, or a decision is made that this composition can't be completed. The probability of an error in making such a decision does not exceed 0.0001, and its value decreases, with increasing n. It is established that the average time, required for the queen to be placed on one row, decreases with increasing value of n. A description is given of two random selection models and the results of their comparative analysis. A model for organizing the Back Tracking procedure is proposed based on the separation of the solution matrix into two basic levels. Regression
kubernetes-goat - Kubernetes Goat is a "Vulnerable by Design" cluster environment to learn and practice Kubernetes security using an interactive hands-on playground 🚀
glauth - A lightweight LDAP server for development, home use, or CI