OWASP / www-project-proactive-controls
OWASP Foundation Web Respository
☆142Updated this week
Alternatives and similar repositories for www-project-proactive-controls
Users that are interested in www-project-proactive-controls are comparing it to the libraries listed below
Sorting:
- OWASP Foundation Web Respository☆63Updated last year
- Core model including reused documentation☆98Updated last month
- This project is about creating and publishing threat model examples.☆419Updated 3 years ago
- OWASP Foundation Web Respository☆42Updated last year
- OWASP Foundation Web Respository☆73Updated last month
- Software Component Verification Standard (SCVS)☆144Updated last month
- threatspec - continuous threat modeling, through code☆357Updated 4 years ago
- The Security Champion Framework provides both a measuring stick and a roadmap generator for Champion Programs.☆108Updated last year
- OWASP Code Review Guide Web Repository☆134Updated 2 years ago
- The OWASP Vulnerable Web Applications Directory Project (VWAD) is a comprehensive and well maintained registry of all known vulnerable we…☆43Updated last month
- SAMM stands for Software Assurance Maturity Model.☆399Updated 2 years ago
- The OWASP DevSecOps Guideline explains how we can implement a secure pipeline and use best practices and introduce tools that we can use …☆66Updated 11 months ago
- Security Champions Playbook v 2.1☆369Updated last year
- An extensive list of resources related to threat modelling. Gotta catch ’em all!☆34Updated 3 months ago
- The OWASP Secure Headers Project☆157Updated this week
- OWASP Foundation Threat Dragon Project Web Repository☆81Updated last week
- OWASP Project Developer Guide - Document and Project Web pages☆112Updated last week
- ☆87Updated 3 years ago
- The Pixi module is a MEAN Stack web app with wildly insecure APIs!☆125Updated 2 years ago
- Desktop variant of OWASP Threat Dragon☆77Updated 3 years ago
- ☆187Updated 2 years ago
- OWASP Foundation Web Respository☆28Updated 8 months ago
- OWASP Serverless Top 10☆216Updated 3 years ago
- A starter secure code review checklist☆182Updated 6 years ago
- ☆105Updated 2 weeks ago
- ☆77Updated 6 months ago
- Purposely vulnerable Java application to help lead secure coding workshops☆179Updated 10 months ago
- Host and manage multiple Juice Shop instances for security trainings and Capture The Flags☆285Updated last week
- 🧮 An online calculator to assess the risk of web vulnerabilities based on OWASP Risk Assessment☆158Updated 3 years ago
- OWASP Foundation Web Respository☆19Updated 2 months ago