OWASP / IoT-Security-Verification-Standard-ISVSLinks
OWASP IoT Security Verification Standard (ISVS)
☆146Updated last month
Alternatives and similar repositories for IoT-Security-Verification-Standard-ISVS
Users that are interested in IoT-Security-Verification-Standard-ISVS are comparing it to the libraries listed below
Sorting:
- NCC Group Template for the Microsoft Threat Modeling Tool 2016 for Automotive Security☆48Updated 5 years ago
- The IoT Security Testing Guide (ISTG) provides a comprehensive methodology for penetration tests in the IoT field, offering flexibility t…☆114Updated 3 months ago
- IriusRisk Community☆67Updated 2 years ago
- Desktop variant of OWASP Threat Dragon☆78Updated 4 years ago
- IoTGoat is a deliberately insecure firmware based on OpenWrt.☆183Updated 5 years ago
- Embedded AppSec Best Practices☆43Updated last month
- Set of tools for security testing of Internet of Things devices using specific network IoT protocols☆362Updated last year
- The Firmware Security Testing Methodology (FSTM) is composed of nine stages tailored to enable security researchers, software developers,…☆438Updated last month
- ☆124Updated 2 years ago
- The OpenSSF CVE Benchmark consists of code and metadata for over 200 real life CVEs, as well as tooling to analyze the vulnerable codebas…☆155Updated last year
- materials we hand out☆148Updated 4 months ago
- Damn Vulnerable IoT Device☆213Updated last year
- ☆33Updated 3 years ago
- Purposely vulnerable Java application to help lead secure coding workshops☆190Updated last year
- Presentations, training modules, and other education materials from Duo Security's Application Security team.☆77Updated 4 years ago
- Semgrep rules corresponding to the OWASP ASVS standard☆28Updated 5 years ago
- A simple web app that helps developers understand the ASVS requirements.☆162Updated last month
- Segment's Threat Modeling training for our engineers☆245Updated 4 years ago
- ☆88Updated 4 years ago
- Python API library for DefectDojo☆43Updated 2 years ago
- threatspec - continuous threat modeling, through code☆370Updated 4 years ago
- ☆69Updated 4 months ago
- A Continuous Threat Modeling methodology☆327Updated 3 years ago
- A small tool to help developers understand a huge set of security requirements from appsec teams☆47Updated 3 years ago
- This repository stores content that can be used to design a Rapid Threat Model Prototyping process for a software development group.☆164Updated 2 years ago
- This project is about creating and publishing threat model examples.☆427Updated 4 years ago
- Static Token And Credential Scanner☆95Updated 2 years ago
- A step-by-step walkthrough of CloudGoat 2.0 scenarios.☆134Updated 5 years ago
- Project intended to make Attack Maps part of software development by reducing the time it takes to complete them.☆48Updated 8 years ago
- Methodology for high-quality web application security testing - https://github.com/tprynn/web-methodology/wiki☆212Updated last year