OWASP / IoT-Security-Verification-Standard-ISVSLinks
OWASP IoT Security Verification Standard (ISVS)
☆148Updated 2 months ago
Alternatives and similar repositories for IoT-Security-Verification-Standard-ISVS
Users that are interested in IoT-Security-Verification-Standard-ISVS are comparing it to the libraries listed below
Sorting:
- NCC Group Template for the Microsoft Threat Modeling Tool 2016 for Automotive Security☆48Updated 5 years ago
- Set of tools for security testing of Internet of Things devices using specific network IoT protocols☆361Updated last year
- The IoT Security Testing Guide (ISTG) provides a comprehensive methodology for penetration tests in the IoT field, offering flexibility t…☆112Updated 4 months ago
- IoTGoat is a deliberately insecure firmware based on OpenWrt.☆183Updated 5 years ago
- The Firmware Security Testing Methodology (FSTM) is composed of nine stages tailored to enable security researchers, software developers,…☆441Updated 2 months ago
- IriusRisk Community☆69Updated 2 years ago
- Damn Vulnerable IoT Device☆214Updated last year
- Desktop variant of OWASP Threat Dragon☆78Updated 4 years ago
- ☆124Updated 2 years ago
- Embedded AppSec Best Practices☆43Updated 2 months ago
- Java Observability Toolkit☆62Updated last year
- materials we hand out☆147Updated 5 months ago
- Purposely vulnerable Java application to help lead secure coding workshops☆191Updated last year
- The OpenSSF CVE Benchmark consists of code and metadata for over 200 real life CVEs, as well as tooling to analyze the vulnerable codebas…☆157Updated last year
- A simple web app that helps developers understand the ASVS requirements. Now supporting ASVS 5.0☆163Updated last month
- Python API library for DefectDojo☆43Updated 2 years ago
- Semgrep rules corresponding to the OWASP ASVS standard☆27Updated 5 years ago
- Static Token And Credential Scanner☆95Updated 2 years ago
- ☆33Updated 3 years ago
- Damn Vulnerable Java (EE) Application☆144Updated last year
- threatspec - continuous threat modeling, through code☆374Updated 4 years ago
- ☆87Updated 4 years ago
- IoT Penetration Testing Cookbook, published by Packt☆120Updated 2 years ago
- This project is about creating and publishing threat model examples.☆429Updated 4 years ago
- Intentionally Vulnerable Serverless Functions to understand the specifics of Serverless Security Vulnerabilities☆136Updated 3 years ago
- 🖇️ equivalence table between OWASP ASVS standard and STRIDE threat modeling methodology.☆75Updated last year
- List of the tools and usage☆234Updated 5 months ago
- A step-by-step walkthrough of CloudGoat 2.0 scenarios.☆134Updated 5 years ago
- IoTGoat is a deliberately insecure firmware created to educate software developers and security professionals with testing commonly foun…☆848Updated 2 months ago
- Segment's Threat Modeling training for our engineers☆244Updated 4 years ago