OWASP / cornucopia
The source files and tools needed to build the OWASP Cornucopia decks in various languages
☆60Updated this week
Alternatives and similar repositories for cornucopia:
Users that are interested in cornucopia are comparing it to the libraries listed below
- ☆98Updated this week
- Threat Modeling Manifesto☆27Updated 7 months ago
- Core model including reused documentation☆95Updated last week
- OWASP Foundation Web Respository☆28Updated 6 months ago
- ☆82Updated 3 years ago
- OWASP Project Developer Guide - Document and Project Web pages☆108Updated this week
- The Security Champion Framework provides both a measuring stick and a roadmap generator for Champion Programs.☆107Updated last year
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆113Updated this week
- OWASP Foundation Threat Dragon Project Web Repository☆78Updated last week
- 🖇️ STRIDE vs. ASVS equivalence table☆75Updated 6 months ago
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆171Updated 3 months ago
- AI featured threat modeling and security review action☆43Updated 3 months ago
- A full insecure kubernetes application for testing security tools☆68Updated last week
- ☆32Updated 3 years ago
- OWASP Foundation Web Respository☆28Updated 2 years ago
- StartLeft is an automation tool for generating Threat Models written in the Open Threat Model (OTM) format from a variety of different so…☆49Updated this week
- NextJS-based single-page application for completing and reviewing SAMM assessments☆70Updated last year
- ☆31Updated 2 years ago
- ☆25Updated last year
- ☆74Updated 4 months ago
- OWASP Foundation Web Respository☆44Updated 6 months ago
- A compilation of Software Supply Chain Security resources including initiatives, standards, regulations, organizations, vendors, tooling,…☆131Updated last year
- OWASP Foundation Web Respository☆63Updated last year
- Continuous Audit Metrics☆25Updated 9 months ago
- An extensive list of resources related to threat modelling. Gotta catch ’em all!☆32Updated 3 weeks ago
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆49Updated this week
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆71Updated 10 months ago
- Cloud Commotion intends to cause chaos to simulate security incidents☆145Updated 8 months ago
- The Open Security Summit is focused on the collaboration between, Developers and Application Security☆45Updated 2 months ago