OWASP IoT Security Verification Standard (ISVS)
☆148Oct 6, 2025Updated 5 months ago
Alternatives and similar repositories for IoT-Security-Verification-Standard-ISVS
Users that are interested in IoT-Security-Verification-Standard-ISVS are comparing it to the libraries listed below
Sorting:
- The Firmware Security Testing Methodology (FSTM) is composed of nine stages tailored to enable security researchers, software developers,…☆443Oct 5, 2025Updated 5 months ago
- The IoT Security Testing Guide (ISTG) provides a comprehensive methodology for penetration tests in the IoT field, offering flexibility t…☆114Jul 29, 2025Updated 7 months ago
- UniSBOM is a tool to build a software bill of materials on any platform with a unified data format.☆36Sep 4, 2022Updated 3 years ago
- IoTGoat is a deliberately insecure firmware created to educate software developers and security professionals with testing commonly foun…☆867Oct 5, 2025Updated 5 months ago
- Template repo for Conjur repositories☆17Nov 3, 2025Updated 4 months ago
- OWASP Foundation Web Respository☆17Dec 9, 2025Updated 2 months ago
- Software Component Verification Standard (SCVS)☆156Apr 1, 2025Updated 11 months ago
- EmbedOS - Embedded security testing virtual machine☆161Oct 21, 2020Updated 5 years ago
- This projects provides a logger and a connected harlem shake js.☆20May 17, 2024Updated last year
- SAMM stands for Software Assurance Maturity Model.☆398May 17, 2022Updated 3 years ago
- OWASP IoT Top 10 2018 Mapping Project☆20Oct 16, 2019Updated 6 years ago
- ECED440 Computer Security☆11Nov 6, 2024Updated last year
- We borrow the concept of 'personas' from UX/service design and apply it to threat actors to improve understanding between security, techn…☆11Jun 17, 2020Updated 5 years ago
- ☆12Feb 16, 2017Updated 9 years ago
- Firmware Analysis and Comparison Tool☆1,423Feb 27, 2026Updated last week
- Core model including reused documentation☆102Dec 16, 2025Updated 2 months ago
- ☆11Dec 27, 2024Updated last year
- ☆13Mar 27, 2021Updated 4 years ago
- AWS container security survey 2020☆11Dec 2, 2020Updated 5 years ago
- The command-line client for Journal☆12Oct 26, 2024Updated last year
- A tool which tries to map CVEs from NVD to packages in supported ecosystems (Maven, NPM, PyPI).☆12Jul 12, 2025Updated 7 months ago
- This code was used for the blogpost on secjuice.☆43Apr 17, 2019Updated 6 years ago
- OWASP Benchmark is a test suite designed to verify the speed and accuracy of software vulnerability detection tools. A fully runnable web…☆775Updated this week
- Embedded AppSec Best Practices☆45Oct 22, 2025Updated 4 months ago
- ☆14Dec 3, 2022Updated 3 years ago
- LLM Vulnerable Application☆13Aug 19, 2023Updated 2 years ago
- SSE to Stdio MCP Proxy Server☆19Feb 17, 2026Updated 2 weeks ago
- Threat Modeling Tool Extension for Penetration Tester (TMTe4PT)☆12Mar 2, 2022Updated 4 years ago
- Bits of Terraform that you can use to do bad things in CI/CD pipelines that run Terraform☆10Nov 10, 2020Updated 5 years ago
- Jupyter Kernel for CodeQL☆15Feb 26, 2025Updated last year
- 🖇️ equivalence table between OWASP ASVS standard and STRIDE threat modeling methodology.☆76Aug 22, 2024Updated last year
- IoTGoat is a deliberately insecure firmware based on OpenWrt.☆185Mar 29, 2020Updated 5 years ago
- POC in order to materialize CSRF prevention concepts described in the following OWASP CSRF cheatsheet☆30May 25, 2017Updated 8 years ago
- An Intentionally designed Vulnerable Android Application built in Kotlin.☆256Mar 2, 2022Updated 4 years ago
- Windows Privilege Escalation☆18Jun 11, 2022Updated 3 years ago
- Training scenarios for cyber ranges☆15Apr 24, 2020Updated 5 years ago
- Dependency vulnerability auditor for Ruby☆13Jan 22, 2026Updated last month
- A collection of various scripts and automations to simplify Checkmarx SAST and IAST setup and use☆14Aug 30, 2018Updated 7 years ago
- A curated list of awesome baseband research resources☆16Sep 8, 2019Updated 6 years ago