BlazingWind / OWASP-ASVS-4.0-testing-guide
โ123Updated last year
Alternatives and similar repositories for OWASP-ASVS-4.0-testing-guide:
Users that are interested in OWASP-ASVS-4.0-testing-guide are comparing it to the libraries listed below
- ๐๏ธ STRIDE vs. ASVS equivalence tableโ76Updated 8 months ago
- The Security Champion Framework provides both a measuring stick and a roadmap generator for Champion Programs.โ107Updated last year
- A small tool to help developers understand a huge set of security requirements from appsec teamsโ45Updated 2 years ago
- A unified DevSecOps Framework that allows you to go from iterative, collaborative Threat Modeling to Application Security Test Orchestratโฆโ279Updated 3 weeks ago
- A step-by-step walkthrough of CloudGoat 2.0 scenarios.โ134Updated 4 years ago
- Segment's Threat Modeling training for our engineersโ243Updated 3 years ago
- โ87Updated 3 years ago
- โ63Updated 2 years ago
- A simple web app that helps developers understand the ASVS requirements.โ157Updated last month
- materials we hand outโ142Updated 3 weeks ago
- NextJS-based single-page application for completing and reviewing SAMM assessmentsโ72Updated 2 years ago
- Semgrep rules corresponding to the OWASP ASVS standardโ27Updated 4 years ago
- Presentations, training modules, and other education materials from Duo Security's Application Security team.โ73Updated 3 years ago
- Container Security Verification Standardโ58Updated 5 years ago
- Orchestron is an Application Vulnerability Management and Correlation Tool.Orchestron helps you solve one key problem "Find and fix vulneโฆโ31Updated 2 years ago
- Python API library for DefectDojoโ41Updated 2 years ago
- ๐งฎ An online calculator to assess the risk of web vulnerabilities based on OWASP Risk Assessmentโ158Updated 3 years ago
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. โฆโ62Updated 9 months ago
- โ35Updated 3 years ago
- drHEADer helps with the audit of security headers received in response to a single request or a list of requests.โ110Updated 3 months ago
- IAMFinder enumerates and finds users and IAM roles in a target AWS account.โ111Updated 4 years ago
- Core model including reused documentationโ96Updated 3 weeks ago
- โ100Updated 3 weeks ago
- Node application to help managing Maturity Models like the ones created by BSIMM and OpenSAMMโ193Updated 6 years ago
- โ32Updated 4 years ago
- threatspec - continuous threat modeling, through codeโ354Updated 4 years ago
- A Continuous Threat Modeling methodologyโ318Updated 2 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parametersโ102Updated last year
- Project intended to make Attack Maps part of software development by reducing the time it takes to complete them.โ48Updated 8 years ago
- Software Component Verification Standard (SCVS)โ143Updated 3 weeks ago