BBVA / sustoLinks
Systematic Universal Security Testing Orchestration
β37Updated 3 years ago
Alternatives and similar repositories for susto
Users that are interested in susto are comparing it to the libraries listed below
Sorting:
- β66Updated last month
- ποΈ STRIDE vs. ASVS equivalence tableβ76Updated last year
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.β176Updated 9 months ago
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. β¦β66Updated 2 months ago
- β35Updated 4 years ago
- β19Updated 3 years ago
- The Security Champion Framework provides both a measuring stick and a roadmap generator for Champion Programs.β108Updated last year
- β88Updated 4 years ago
- β124Updated last year
- A small tool to help developers understand a huge set of security requirements from appsec teamsβ47Updated 3 years ago
- Threat Modeling Manifestoβ29Updated last year
- A Cloud Security Posture Manager or CSPM with a focus on security analysis for the modern cloud stack and a focus on the emerging threat β¦β191Updated last year
- Segment's Threat Modeling training for our engineersβ245Updated 4 years ago
- Presentations, training modules, and other education materials from Duo Security's Application Security team.β75Updated 4 years ago
- KaiMonkey provides vulnerable infrastructure as code (IaC) to help explore and understand common cloud security threats exposed via IaC.β103Updated last year
- This repository stores content that can be used to design a Rapid Threat Model Prototyping process for a software development group.β163Updated 2 years ago
- Threat model for Amazon S3 - Library of all the attack scenarios on Amazon S3, and how to mitigate them following a risk-based approachβ157Updated last year
- Project intended to make Attack Maps part of software development by reducing the time it takes to complete them.β48Updated 8 years ago
- threatspec - continuous threat modeling, through codeβ366Updated 4 years ago
- Docs: Vulnerability management aggregation of AppSec & OpSec (Tools Listing)β31Updated 2 years ago
- AI featured threat modeling and security review actionβ45Updated 9 months ago
- β16Updated 2 years ago
- OWASP Cloud Security - Enabling conversations through threat and control storiesβ181Updated 6 years ago
- β14Updated 2 years ago
- A unified DevSecOps Framework that allows you to go from iterative, collaborative Threat Modeling to Application Security Test Orchestratβ¦β282Updated 3 weeks ago
- Examples on how to maintain security/compliance as code and to automate SecOps using the JupiterOne platform.β54Updated last year
- A Continuous Threat Modeling methodologyβ324Updated 3 years ago
- Repository for the Open Information Security Risk Universeβ64Updated 3 years ago
- This repository will teach you have to do my talk "Pushing Left, Like a Boss".β70Updated 3 years ago
- IAMFinder enumerates and finds users and IAM roles in a target AWS account.β110Updated 4 years ago