OWASP / IoT-Security-Verification-Standard-ISVSView external linksLinks
OWASP IoT Security Verification Standard (ISVS)
☆148Oct 6, 2025Updated 4 months ago
Alternatives and similar repositories for IoT-Security-Verification-Standard-ISVS
Users that are interested in IoT-Security-Verification-Standard-ISVS are comparing it to the libraries listed below
Sorting:
- The Firmware Security Testing Methodology (FSTM) is composed of nine stages tailored to enable security researchers, software developers,…☆442Oct 5, 2025Updated 4 months ago
- The IoT Security Testing Guide (ISTG) provides a comprehensive methodology for penetration tests in the IoT field, offering flexibility t…☆113Jul 29, 2025Updated 6 months ago
- IoTGoat is a deliberately insecure firmware created to educate software developers and security professionals with testing commonly foun…☆863Oct 5, 2025Updated 4 months ago
- OWASP Foundation Web Respository☆16Dec 9, 2025Updated 2 months ago
- Template repo for Conjur repositories☆17Nov 3, 2025Updated 3 months ago
- EmbedOS - Embedded security testing virtual machine☆161Oct 21, 2020Updated 5 years ago
- This projects provides a logger and a connected harlem shake js.☆20May 17, 2024Updated last year
- SAMM stands for Software Assurance Maturity Model.☆398May 17, 2022Updated 3 years ago
- OWASP IoT Top 10 2018 Mapping Project☆20Oct 16, 2019Updated 6 years ago
- A Curated list of Security Resources for all connected things☆3,198Updated this week
- We borrow the concept of 'personas' from UX/service design and apply it to threat actors to improve understanding between security, techn…☆11Jun 17, 2020Updated 5 years ago
- ECED440 Computer Security☆11Nov 6, 2024Updated last year
- Firmware Analysis and Comparison Tool☆1,416Updated this week
- Core model including reused documentation☆101Dec 16, 2025Updated last month
- AWS container security survey 2020☆11Dec 2, 2020Updated 5 years ago
- A tool which tries to map CVEs from NVD to packages in supported ecosystems (Maven, NPM, PyPI).☆12Jul 12, 2025Updated 7 months ago
- ☆13Mar 27, 2021Updated 4 years ago
- ☆11Dec 27, 2024Updated last year
- Provide some tips to handle Injection into application code (OWASP TOP 10 - A1).☆10Nov 11, 2020Updated 5 years ago
- SSE to Stdio MCP Proxy Server☆18Jun 9, 2025Updated 8 months ago
- This code was used for the blogpost on secjuice.☆42Apr 17, 2019Updated 6 years ago
- OWASP Benchmark is a test suite designed to verify the speed and accuracy of software vulnerability detection tools. A fully runnable web…☆770Updated this week
- Embedded AppSec Best Practices☆45Oct 22, 2025Updated 3 months ago
- Jupyter Kernel for CodeQL☆15Feb 26, 2025Updated 11 months ago
- Bits of Terraform that you can use to do bad things in CI/CD pipelines that run Terraform☆10Nov 10, 2020Updated 5 years ago
- LLM Vulnerable Application☆13Aug 19, 2023Updated 2 years ago
- Threat Modeling Tool Extension for Penetration Tester (TMTe4PT)☆12Mar 2, 2022Updated 3 years ago
- 🖇️ equivalence table between OWASP ASVS standard and STRIDE threat modeling methodology.☆76Aug 22, 2024Updated last year
- IoTGoat is a deliberately insecure firmware based on OpenWrt.☆185Mar 29, 2020Updated 5 years ago
- POC in order to materialize CSRF prevention concepts described in the following OWASP CSRF cheatsheet☆30May 25, 2017Updated 8 years ago
- Open Threat Modeling Template☆52Jul 10, 2024Updated last year
- An Intentionally designed Vulnerable Android Application built in Kotlin.☆256Mar 2, 2022Updated 3 years ago
- An assessment tool to interact with Velocio PLCs☆13Sep 24, 2021Updated 4 years ago
- A collection of various scripts and automations to simplify Checkmarx SAST and IAST setup and use☆14Aug 30, 2018Updated 7 years ago
- Dependency vulnerability auditor for Ruby☆13Jan 22, 2026Updated 3 weeks ago
- Training scenarios for cyber ranges☆14Apr 24, 2020Updated 5 years ago
- A curated list of awesome baseband research resources☆16Sep 8, 2019Updated 6 years ago
- A very vulnerable implementation of a GraphQL API.☆17Updated this week
- Implementation of QFuzz.☆17Dec 3, 2021Updated 4 years ago