☆125Nov 8, 2023Updated 2 years ago
Alternatives and similar repositories for OWASP-ASVS-4.0-testing-guide
Users that are interested in OWASP-ASVS-4.0-testing-guide are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ZAP scripts to implement ASVS L1 checking☆17Apr 28, 2022Updated 4 years ago
- OWASP Application Security Verification Standard 4.0 Checklist☆33Apr 15, 2019Updated 7 years ago
- A simple web app that helps developers understand the ASVS requirements. Now supporting ASVS 5.0☆164Nov 25, 2025Updated 5 months ago
- Externalize Java application access to protected resources as log messages.☆44Apr 2, 2026Updated last month
- Semgrep rules corresponding to the OWASP ASVS standard☆27Nov 2, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- 🖇️ equivalence table between OWASP ASVS standard and STRIDE threat modeling methodology.☆76Aug 22, 2024Updated last year
- Interactive IPython Notebook to demonstrate OWASP ZAP's API and Scripting Functions - OWASP ZAP 2.8.0☆41Dec 8, 2022Updated 3 years ago
- We borrow the concept of 'personas' from UX/service design and apply it to threat actors to improve understanding between security, techn…☆11Jun 17, 2020Updated 5 years ago
- A small tool to help developers understand a huge set of security requirements from appsec teams☆47Sep 2, 2022Updated 3 years ago
- This project is about creating and publishing threat model examples.☆433Nov 10, 2021Updated 4 years ago
- ☆14Dec 3, 2022Updated 3 years ago
- Corsair_scan is a security tool to test Cross-Origin Resource Sharing (CORS).☆123Apr 14, 2023Updated 3 years ago
- ☆35May 13, 2021Updated 4 years ago
- ☆32May 22, 2023Updated 2 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Example of using Gauge and OWASP ZAP for test automation☆11Jan 9, 2020Updated 6 years ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆13Apr 18, 2020Updated 6 years ago
- Application Security Verification Standard☆3,412Mar 17, 2026Updated last month
- ☆20Jan 18, 2022Updated 4 years ago
- ☆36Mar 8, 2022Updated 4 years ago
- threatspec - continuous threat modeling, through code☆383Dec 30, 2020Updated 5 years ago
- OWASP Foundation Web Respository☆11May 22, 2023Updated 2 years ago
- OWASP ASVS checklist for audits☆216Jan 5, 2024Updated 2 years ago
- ☆69Jul 18, 2025Updated 9 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆30Jul 29, 2021Updated 4 years ago
- Yet Another SCA tool☆13Nov 10, 2022Updated 3 years ago
- ☆15Feb 9, 2022Updated 4 years ago
- A Continuous Threat Modeling methodology☆327Jun 24, 2022Updated 3 years ago
- A tool that automates the trevorc2 powershell agent obfuscation process with the pyfuscation tool☆15Jun 28, 2023Updated 2 years ago
- ☆17Apr 16, 2026Updated 2 weeks ago
- Whitebox evaluation of effective S3 object permissions, to identify publicly accessible files.☆78Mar 4, 2022Updated 4 years ago
- OAuth 2.0 Dynamic Security Scanner☆33Feb 27, 2021Updated 5 years ago
- Provide some tips to handle Injection into application code (OWASP TOP 10 - A1).☆10Nov 11, 2020Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- InfoSec OpenAI Examples☆19Nov 26, 2023Updated 2 years ago
- This repository stores content that can be used to design a Rapid Threat Model Prototyping process for a software development group.☆165Mar 14, 2023Updated 3 years ago
- Apache HTTP-Server 2.4.49-2.4.50 Path Traversal & Remote Code Execution PoC (CVE-2021-41773 & CVE-2021-42013)☆13Aug 22, 2025Updated 8 months ago
- WebStor efficiently enumerates all websites across your organization’s networks and those in your DNS records - including cloud-hosted se…☆157Mar 31, 2024Updated 2 years ago
- CLI Search for Security Operators of MITRE ATT&CK URLs☆17Jan 5, 2023Updated 3 years ago
- ☆18Apr 21, 2020Updated 6 years ago
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raider☆139Sep 14, 2021Updated 4 years ago