OWASP / cornucopia
The source files and tools needed to build the OWASP Cornucopia decks in various languages
☆61Updated this week
Alternatives and similar repositories for cornucopia:
Users that are interested in cornucopia are comparing it to the libraries listed below
- OWASP Foundation Web Respository☆31Updated 2 years ago
- OWASP Foundation Web Respository☆28Updated 7 months ago
- Core model including reused documentation☆95Updated 2 weeks ago
- Threat Modeling Manifesto☆28Updated 8 months ago
- ☆87Updated 3 years ago
- ☆100Updated 2 weeks ago
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆191Updated this week
- A full insecure kubernetes application for testing security tools☆70Updated last week
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆171Updated 4 months ago
- StartLeft is an automation tool for generating Threat Models written in the Open Threat Model (OTM) format from a variety of different so…☆50Updated last week
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆68Updated last month
- OWASP Foundation Web Respository☆82Updated 2 months ago
- An experimental project using LLM technology to generate security documentation for Open Source Software (OSS) projects☆27Updated last month
- ☆33Updated 3 years ago
- OWASP Foundation Web Respository☆55Updated last year
- Cloud Offensive Breach and Risk Assessment (COBRA) Tool☆90Updated last month
- InfoSec OpenAI Examples☆19Updated last year
- A tool for preventing the installation of malicious PyPI and npm packages☆133Updated last week
- AI featured threat modeling and security review action☆43Updated 4 months ago
- ☆25Updated last year
- NextJS-based single-page application for completing and reviewing SAMM assessments☆72Updated 2 years ago
- The Security Champion Framework provides both a measuring stick and a roadmap generator for Champion Programs.☆107Updated last year
- Use AI to Scan Your Code from the Command Line for security and code smells. Bring your own keys. Supports OpenAI and Gemini☆165Updated last week
- ☆41Updated last month
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆58Updated last year
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆73Updated 11 months ago
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆62Updated 9 months ago
- Cloud Commotion intends to cause chaos to simulate security incidents☆144Updated 9 months ago
- 🖇️ STRIDE vs. ASVS equivalence table☆76Updated 7 months ago
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆91Updated last year