BBVA / susto
Systematic Universal Security Testing Orchestration
β37Updated 2 years ago
Related projects β
Alternatives and complementary repositories for susto
- ποΈ STRIDE vs. ASVS equivalence tableβ75Updated 2 months ago
- β61Updated last year
- Threat Modeling Manifestoβ27Updated 4 months ago
- β37Updated 7 months ago
- β36Updated 3 years ago
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. β¦β55Updated 4 months ago
- Orchestron is an Application Vulnerability Management and Correlation Tool.Orchestron helps you solve one key problem "Find and fix vulneβ¦β31Updated last year
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.β169Updated 9 months ago
- β18Updated 2 years ago
- β80Updated 3 years ago
- β16Updated last year
- Updated incident response generator for training classesβ41Updated 3 years ago
- OWASP Foundation Web Respositoryβ27Updated last year
- The Security Champion Framework provides both a measuring stick and a roadmap generator for Champion Programs.β104Updated 10 months ago
- β30Updated 2 years ago
- StartLeft is an automation tool for generating Threat Models written in the Open Threat Model (OTM) format from a variety of different soβ¦β48Updated this week
- Docs: Vulnerability management aggregation of AppSec & OpSec (Tools Listing)β30Updated last year
- Presentations, training modules, and other education materials from Duo Security's Application Security team.β71Updated 3 years ago
- Repository for the Open Information Security Risk Universeβ63Updated 2 years ago
- AI featured threat modeling and security review actionβ40Updated this week
- Convert cloudtrail data to MITRE ATT&CK Sightingsβ79Updated 2 years ago
- Examples on how to maintain security/compliance as code and to automate SecOps using the JupiterOne platform.β53Updated 10 months ago
- β80Updated this week
- AppSecPipeline Specification for DevOps automation.β38Updated last year
- Semgrep rules corresponding to the OWASP ASVS standardβ27Updated 4 years ago
- Security Scanner based on CIS benchmark 1.1 inspired by Scout2β52Updated last year
- CI Pipeline with Pixi, the WAF OWASP Core Rule Set and TestCafe tests.β15Updated 3 years ago
- KaiMonkey provides vulnerable infrastructure as code (IaC) to help explore and understand common cloud security threats exposed via IaC.β96Updated 11 months ago
- ThreatModel for Amazon S3 - Library of all the attack scenarios on Amazon S3, and how to mitigate them following a risk-based approachβ151Updated last year