OWASP / IoT-Security-Verification-Standard-ISVSLinks
OWASP IoT Security Verification Standard (ISVS)
☆141Updated 2 years ago
Alternatives and similar repositories for IoT-Security-Verification-Standard-ISVS
Users that are interested in IoT-Security-Verification-Standard-ISVS are comparing it to the libraries listed below
Sorting:
- NCC Group Template for the Microsoft Threat Modeling Tool 2016 for Automotive Security☆47Updated 4 years ago
- Embedded AppSec Best Practices☆41Updated last year
- The Firmware Security Testing Methodology (FSTM) is composed of nine stages tailored to enable security researchers, software developers,…☆420Updated 3 years ago
- The IoT Security Testing Guide (ISTG) provides a comprehensive methodology for penetration tests in the IoT field, offering flexibility t…☆100Updated 8 months ago
- Desktop variant of OWASP Threat Dragon☆77Updated 3 years ago
- IriusRisk Community☆65Updated last year
- IoTGoat is a deliberately insecure firmware based on OpenWrt.☆182Updated 5 years ago
- This project is about creating and publishing threat model examples.☆419Updated 3 years ago
- ☆63Updated 2 years ago
- ☆123Updated last year
- ☆87Updated 3 years ago
- Set of tools for security testing of Internet of Things devices using specific network IoT protocols☆359Updated last year
- ☆194Updated 7 months ago
- This repository stores content that can be used to design a Rapid Threat Model Prototyping process for a software development group.☆161Updated 2 years ago
- threatspec - continuous threat modeling, through code☆357Updated 4 years ago
- 🖇️ STRIDE vs. ASVS equivalence table☆76Updated 9 months ago
- Software Component Verification Standard (SCVS)☆147Updated 2 months ago
- Damn Vulnerable Java (EE) Application☆138Updated last year
- A simple web app that helps developers understand the ASVS requirements.☆158Updated 3 months ago
- ☆33Updated 3 years ago
- Purposely vulnerable Java application to help lead secure coding workshops☆181Updated 11 months ago
- materials we hand out☆145Updated 2 months ago
- Static Token And Credential Scanner☆96Updated 2 years ago
- ☆32Updated 4 years ago
- A step-by-step walkthrough of CloudGoat 2.0 scenarios.☆134Updated 5 years ago
- The OpenSSF CVE Benchmark consists of code and metadata for over 200 real life CVEs, as well as tooling to analyze the vulnerable codebas…☆144Updated last year
- Semgrep rules corresponding to the OWASP ASVS standard☆27Updated 4 years ago
- Segment's Threat Modeling training for our engineers☆243Updated 4 years ago
- A unified DevSecOps Framework that allows you to go from iterative, collaborative Threat Modeling to Application Security Test Orchestrat…☆279Updated last week
- Material for the training "Developing Burp Suite Extensions – From Manual Testing to Security Automation"☆353Updated 4 years ago