OWASP / www-project-vulnerability-management-guideLinks
OWASP Foundation Web Respository
☆31Updated 2 years ago
Alternatives and similar repositories for www-project-vulnerability-management-guide
Users that are interested in www-project-vulnerability-management-guide are comparing it to the libraries listed below
Sorting:
- Threat Modeling Manifesto☆28Updated 10 months ago
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆75Updated last year
- Maturity Model Collaborative project☆15Updated 2 years ago
- An experimental project using LLM technology to generate security documentation for Open Source Software (OSS) projects☆28Updated 3 months ago
- ☆51Updated this week
- InfoSec OpenAI Examples☆19Updated last year
- ☆41Updated 3 months ago
- ☆87Updated 3 years ago
- ☆19Updated 3 years ago
- Docs: Vulnerability management aggregation of AppSec & OpSec (Tools Listing)☆30Updated 2 years ago
- A collection of dashboards, templates, API's and Power BI code for vulnerability management and analysis☆22Updated 4 months ago
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆65Updated 11 months ago
- OWASP Foundation Web Respository☆9Updated this week
- Autoconfigured ELK Stack That Contains All EPSS and NVD CVE Data☆51Updated last month
- The Measure, Maximize, and Mature Threat-Informed Defense (M3TID) project defines what Threat-Informed Defense (TID) is and the key activ…☆16Updated this week
- The Open Security Summit is focused on the collaboration between, Developers and Application Security☆45Updated 5 months ago
- GCP GOAT is the vulnerable application for learn the GCP Security☆64Updated 2 weeks ago
- Global Security Database Tools☆42Updated last year
- Documentation on the Cyber Defense Matrix☆24Updated 2 years ago
- This repository provides a comprehensive collection of Pulumi scenarios utilized by cnappgoat☆21Updated 4 months ago
- OWASP Foundation Web Respository☆16Updated 3 years ago
- This provides a guided step by step walkthrough for threat modeling with MITRE ATT&CK Framework☆28Updated 3 months ago
- 🖇️ STRIDE vs. ASVS equivalence table☆76Updated 9 months ago
- Semgrep rules corresponding to the OWASP ASVS standard☆27Updated 4 years ago
- Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogue…☆62Updated this week
- OWASP Foundation Web Respository☆28Updated 9 months ago
- ☆16Updated 2 years ago
- ☆36Updated 5 months ago
- A small tool to help developers understand a huge set of security requirements from appsec teams☆45Updated 2 years ago
- A CALDERA plugin☆26Updated 10 months ago