OWASP / www-project-threat-dragon
OWASP Foundation Threat Dragon Project Web Repository
☆73Updated this week
Related projects ⓘ
Alternatives and complementary repositories for www-project-threat-dragon
- Desktop variant of OWASP Threat Dragon☆77Updated 3 years ago
- A unified DevSecOps Framework that allows you to go from iterative, collaborative Threat Modeling to Application Security Test Orchestrat…☆274Updated this week
- threatspec - continuous threat modeling, through code☆332Updated 3 years ago
- OWASP Foundation Web Respository☆27Updated 3 months ago
- ☆80Updated this week
- 🖇️ STRIDE vs. ASVS equivalence table☆75Updated 2 months ago
- ☆61Updated last year
- ☆80Updated 3 years ago
- ☆30Updated 2 years ago
- Presentations, training modules, and other education materials from Duo Security's Application Security team.☆71Updated 3 years ago
- Repository for the Open Information Security Risk Universe☆63Updated 2 years ago
- Threat Modeling Manifesto☆27Updated 4 months ago
- IriusRisk Community☆62Updated last year
- Security scanning & static analysis tool☆93Updated last month
- ☆36Updated 3 years ago
- The Security Champion Framework provides both a measuring stick and a roadmap generator for Champion Programs.☆104Updated 10 months ago
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆55Updated 4 months ago
- Software Component Verification Standard (SCVS)☆135Updated 7 months ago
- a curated list of useful threat modeling resources☆125Updated 4 months ago
- Stakeholder-Specific Vulnerability Categorization☆129Updated this week
- Docs: Vulnerability management aggregation of AppSec & OpSec (Tools Listing)☆30Updated last year
- Global Security Database Tools☆41Updated 11 months ago
- A small tool to help developers understand a huge set of security requirements from appsec teams☆45Updated 2 years ago
- Computer Aided Integration of Requirements and Information Security - Server☆149Updated 2 months ago
- The OWASP DevSecOps Guideline explains how we can implement a secure pipeline and use best practices and introduce tools that we can use …☆61Updated 5 months ago
- Node application to help managing Maturity Models like the ones created by BSIMM and OpenSAMM☆188Updated 6 years ago
- CI Pipeline with Pixi, the WAF OWASP Core Rule Set and TestCafe tests.☆15Updated 3 years ago
- All-in-one tool for managing vulnerability reports from AppSec pipelines☆105Updated last year
- StartLeft is an automation tool for generating Threat Models written in the Open Threat Model (OTM) format from a variety of different so…☆48Updated this week
- A Continuous Threat Modeling methodology☆313Updated 2 years ago