OWASP / www-project-risk-assessment-framework
OWASP Foundation Web Respository
☆17Updated last year
Related projects ⓘ
Alternatives and complementary repositories for www-project-risk-assessment-framework
- The Secure Coding Framework☆20Updated 4 years ago
- Semgrep rules corresponding to the OWASP ASVS standard☆27Updated 4 years ago
- Docs: Vulnerability management aggregation of AppSec & OpSec (Tools Listing)☆30Updated last year
- OWASP Foundation Web Respository☆27Updated last year
- Raf Scanner IDE☆10Updated last year
- InfoSec OpenAI Examples☆19Updated 11 months ago
- The Open Security Summit is focused on the collaboration between, Developers and Application Security☆45Updated this week
- OWASP Foundation Web Respository☆27Updated this week
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆61Updated last year
- ☆14Updated last year
- OWASP Foundation Web Respository☆27Updated 3 months ago
- IriusRisk Community☆62Updated last year
- A tool for testing objects' permissions in AWS buckets☆39Updated 3 years ago
- Puma Prey contains vulnerable .NET target applications to test the Puma Scan rules against. This project contains Web Forms, MVC5, and Co…☆20Updated 7 months ago
- Orchestron is an Application Vulnerability Management and Correlation Tool.Orchestron helps you solve one key problem "Find and fix vulne…☆31Updated 2 years ago
- OWASP Threat Dragon core files☆28Updated 3 years ago
- A Burp plugin to export findings to DefectDojo☆30Updated last year
- Desktop variant of OWASP Threat Dragon☆77Updated 3 years ago
- Maturity Model Collaborative project☆14Updated last year
- ☆30Updated 2 years ago
- CI Pipeline with Pixi, the WAF OWASP Core Rule Set and TestCafe tests.☆15Updated 3 years ago
- ☆61Updated last year
- Extensive code infrastructure for finding unintended information leaks in files, git repositories and much more.☆28Updated 2 years ago
- OWASP Threat Dragon core files☆11Updated 3 months ago
- Pivot into private VPC networks using a VPN connection☆41Updated 5 years ago
- A curated threat modeling library collection☆21Updated 11 months ago
- Yet another open S3 bucket finder☆19Updated 6 years ago
- A Crowdsourcing Exchange for mapping various sources of security vulnerabilities, exposures, threats, and controls data☆26Updated 5 years ago
- Scripts that we use for pentesting☆41Updated 7 years ago
- Microsoft Excel spreadsheets for consistent security evaluation of Android and iOS mobile applications☆50Updated 9 years ago