BlazingWind / OWASP-ASVS-4.0-testing-guideLinks
β123Updated last year
Alternatives and similar repositories for OWASP-ASVS-4.0-testing-guide
Users that are interested in OWASP-ASVS-4.0-testing-guide are comparing it to the libraries listed below
Sorting:
- The Security Champion Framework provides both a measuring stick and a roadmap generator for Champion Programs.β108Updated last year
- ποΈ STRIDE vs. ASVS equivalence tableβ76Updated 10 months ago
- A small tool to help developers understand a huge set of security requirements from appsec teamsβ46Updated 2 years ago
- β66Updated 2 years ago
- A simple web app that helps developers understand the ASVS requirements.β158Updated 4 months ago
- drHEADer helps with the audit of security headers received in response to a single request or a list of requests.β110Updated 6 months ago
- A step-by-step walkthrough of CloudGoat 2.0 scenarios.β134Updated 5 years ago
- Semgrep rules corresponding to the OWASP ASVS standardβ27Updated 4 years ago
- β88Updated 3 years ago
- materials we hand outβ147Updated 3 months ago
- Segment's Threat Modeling training for our engineersβ243Updated 4 years ago
- A unified DevSecOps Framework that allows you to go from iterative, collaborative Threat Modeling to Application Security Test Orchestratβ¦β282Updated last month
- Presentations, training modules, and other education materials from Duo Security's Application Security team.β74Updated 3 years ago
- OWASP ASVS checklist for auditsβ205Updated last year
- threatspec - continuous threat modeling, through codeβ361Updated 4 years ago
- This repository stores content that can be used to design a Rapid Threat Model Prototyping process for a software development group.β162Updated 2 years ago
- A Continuous Threat Modeling methodologyβ322Updated 3 years ago
- IAMFinder enumerates and finds users and IAM roles in a target AWS account.β111Updated 4 years ago
- β35Updated 4 years ago
- β32Updated 4 years ago
- Find cloud assets that no one wants exposed π βοΈβ347Updated 4 years ago
- A checklist of practices for organizations dealing with account takeover (ATO)β269Updated 9 months ago
- β111Updated 2 years ago
- The Pixi module is a MEAN Stack web app with wildly insecure APIs!β128Updated 2 years ago
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. β¦β65Updated 2 weeks ago
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.β172Updated 7 months ago
- OWASP Cloud Security - Enabling conversations through threat and control storiesβ180Updated 6 years ago
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagramsβ105Updated 5 months ago
- Protect against subdomain takeoverβ92Updated last year
- Docs: Vulnerability management aggregation of AppSec & OpSec (Tools Listing)β31Updated 2 years ago