BlazingWind / OWASP-ASVS-4.0-testing-guide
โ123Updated last year
Alternatives and similar repositories for OWASP-ASVS-4.0-testing-guide
Users that are interested in OWASP-ASVS-4.0-testing-guide are comparing it to the libraries listed below
Sorting:
- ๐๏ธ STRIDE vs. ASVS equivalence tableโ76Updated 8 months ago
- A small tool to help developers understand a huge set of security requirements from appsec teamsโ45Updated 2 years ago
- The Security Champion Framework provides both a measuring stick and a roadmap generator for Champion Programs.โ108Updated last year
- A step-by-step walkthrough of CloudGoat 2.0 scenarios.โ134Updated 5 years ago
- โ87Updated 3 years ago
- A simple web app that helps developers understand the ASVS requirements.โ157Updated 2 months ago
- materials we hand outโ144Updated last month
- Presentations, training modules, and other education materials from Duo Security's Application Security team.โ73Updated 3 years ago
- โ63Updated 2 years ago
- Segment's Threat Modeling training for our engineersโ243Updated 4 years ago
- The Pixi module is a MEAN Stack web app with wildly insecure APIs!โ125Updated 2 years ago
- Semgrep rules corresponding to the OWASP ASVS standardโ27Updated 4 years ago
- ๐งฎ An online calculator to assess the risk of web vulnerabilities based on OWASP Risk Assessmentโ158Updated 3 years ago
- A unified DevSecOps Framework that allows you to go from iterative, collaborative Threat Modeling to Application Security Test Orchestratโฆโ279Updated last month
- Container Security Verification Standardโ58Updated 5 years ago
- โ110Updated last year
- drHEADer helps with the audit of security headers received in response to a single request or a list of requests.โ110Updated 4 months ago
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.โ172Updated 5 months ago
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. โฆโ64Updated 10 months ago
- Find cloud assets that no one wants exposed ๐ โ๏ธโ344Updated 4 years ago
- IAMFinder enumerates and finds users and IAM roles in a target AWS account.โ111Updated 4 years ago
- Project intended to make Attack Maps part of software development by reducing the time it takes to complete them.โ48Updated 8 years ago
- Orchestron is an Application Vulnerability Management and Correlation Tool.Orchestron helps you solve one key problem "Find and fix vulneโฆโ31Updated 2 years ago
- NextJS-based single-page application for completing and reviewing SAMM assessmentsโ72Updated 2 years ago
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagramsโ104Updated 3 months ago
- OWASP ASVS checklist for auditsโ203Updated last year
- Python API library for DefectDojoโ41Updated 2 years ago
- Protect against subdomain takeoverโ92Updated 11 months ago
- Methodology for high-quality web application security testing - https://github.com/tprynn/web-methodology/wikiโ203Updated 6 months ago
- ThreatModel for Amazon S3 - Library of all the attack scenarios on Amazon S3, and how to mitigate them following a risk-based approachโ153Updated last year