OWASP / PSCF
☆28Updated last year
Alternatives and similar repositories for PSCF:
Users that are interested in PSCF are comparing it to the libraries listed below
- 🖇️ STRIDE vs. ASVS equivalence table☆76Updated 7 months ago
- The Security Champion Framework provides both a measuring stick and a roadmap generator for Champion Programs.☆107Updated last year
- ☆63Updated 2 years ago
- AI featured threat modeling and security review action☆43Updated 4 months ago
- ☆86Updated 3 years ago
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆170Updated 4 months ago
- Project intended to make Attack Maps part of software development by reducing the time it takes to complete them.☆48Updated 8 years ago
- ☆124Updated last year
- Convert cloudtrail data to MITRE ATT&CK Sightings☆79Updated 2 years ago
- An evolving repository of CloudTrail events with detailed descriptions, MITRE ATT&CK insights, real-world incidents, references and secur…☆149Updated last month
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆187Updated this week
- An experimental project using LLM technology to generate security documentation for Open Source Software (OSS) projects☆27Updated last month
- A full insecure kubernetes application for testing security tools☆70Updated this week
- Cloud Commotion intends to cause chaos to simulate security incidents☆145Updated 9 months ago
- ThreatModel for Amazon S3 - Library of all the attack scenarios on Amazon S3, and how to mitigate them following a risk-based approach☆152Updated last year
- A small tool to help developers understand a huge set of security requirements from appsec teams☆45Updated 2 years ago
- Docs: Vulnerability management aggregation of AppSec & OpSec (Tools Listing)☆30Updated last year
- Threat Modeling Manifesto☆28Updated 8 months ago
- A CLI that scans for sensitive data in source code☆14Updated 2 years ago
- ☆32Updated 4 years ago
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆73Updated 10 months ago
- Protect against subdomain takeover☆93Updated 10 months ago
- ☆18Updated 3 years ago
- Semgrep rules corresponding to the OWASP ASVS standard☆27Updated 4 years ago
- Presentations, training modules, and other education materials from Duo Security's Application Security team.☆73Updated 3 years ago
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆61Updated 9 months ago
- A small set of scripts to summarize AWS Security Groups, and generate visualizations of the rules.☆62Updated 4 years ago
- ☆16Updated last year
- OWASP Foundation Web Respository☆82Updated 2 months ago
- Examples on how to maintain security/compliance as code and to automate SecOps using the JupiterOne platform.☆53Updated last year