OWASP / OpenCRELinks
☆114Updated last week
Alternatives and similar repositories for OpenCRE
Users that are interested in OpenCRE are comparing it to the libraries listed below
Sorting:
- Core model including reused documentation☆98Updated last month
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆172Updated 7 months ago
- Stakeholder-Specific Vulnerability Categorization☆153Updated this week
- StartLeft is an automation tool for generating Threat Models written in the Open Threat Model (OTM) format from a variety of different so…☆50Updated last week
- The Security Champion Framework provides both a measuring stick and a roadmap generator for Champion Programs.☆108Updated last year
- The OpenSSF Vulnerability Disclosures Working Group seeks to help improve the overall security of the open source software ecosystem by h…☆191Updated 3 months ago
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆207Updated this week
- ☆83Updated 8 months ago
- Software Component Verification Standard (SCVS)☆148Updated 3 months ago
- The source files and tools needed to build the OWASP Cornucopia decks in various languages☆74Updated this week
- A compilation of Software Supply Chain Security resources including initiatives, standards, regulations, organizations, vendors, tooling,…☆136Updated last year
- The security workflow engine!☆117Updated this week
- A tool to check the security settings of Github Organizations.☆71Updated 2 years ago
- A community collection of security reviews of open source software components.☆95Updated last year
- OWASP Foundation Threat Dragon Project Web Repository☆81Updated last week
- OWASP Foundation Web Respository☆28Updated 10 months ago
- Working Group on Artificial Intelligence and Machine Learning (AI/ML) Security☆89Updated this week
- App that simplifies building decision trees to model adverse scenarios☆215Updated last year
- OWASP Project Developer Guide - Document and Project Web pages☆112Updated last week
- A standard API specification for exchanging supply chain artifacts and intelligence☆83Updated last week
- A comprehensive, systematic and actionable way to understand attacker behaviors and techniques with respect to the software supply chain☆96Updated 5 months ago
- OWASP Foundation Web Respository☆97Updated 5 months ago
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆78Updated last year
- AI featured threat modeling and security review action☆44Updated 7 months ago
- KaiMonkey provides vulnerable infrastructure as code (IaC) to help explore and understand common cloud security threats exposed via IaC.☆101Updated last year
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆65Updated 2 weeks ago
- Adaptive AWS Zero Trust Policy made easy: Auto-generate least-privilege policies based on user activity in real time! Accelerate the adop…☆76Updated last year
- ☆47Updated last week
- ☆113Updated this week
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆89Updated 2 months ago