Risk-Assessment-Framework / RiskAssessmentFrameworkLinks
The Secure Coding Framework
☆22Updated 4 years ago
Alternatives and similar repositories for RiskAssessmentFramework
Users that are interested in RiskAssessmentFramework are comparing it to the libraries listed below
Sorting:
- Raf Scanner IDE☆11Updated 2 years ago
- OWASP Foundation Web Respository☆10Updated 2 years ago
- OWASP Foundation Web Respository☆31Updated 2 years ago
- OWASP Foundation Web Respository☆18Updated 2 years ago
- Threat Modeling Manifesto☆28Updated 10 months ago
- OWASP Foundation Web Respository☆28Updated 9 months ago
- Exploit Prediction Scoring System (EPSS)☆26Updated 3 years ago
- A collection of data fetchers, and simple quarterly and yearly CVE forecasting models.☆36Updated 4 months ago
- CVSS v4.0 calculator☆31Updated 9 months ago
- ☆10Updated 3 years ago
- ☆27Updated last year
- DefectDojo Community Content☆18Updated 7 months ago
- ☆15Updated 3 years ago
- GitHub action to run Threagile, the agile threat modeling toolkit, on a repo's threagile.yaml file☆13Updated last year
- Maturity Model Collaborative project☆15Updated 2 years ago
- A collection of dashboards, templates, API's and Power BI code for vulnerability management and analysis☆22Updated 4 months ago
- InfoSec OpenAI Examples☆19Updated last year
- Automated process to build and distribute Posture & Exposure Reports' bi-weekly to customers.☆17Updated last year
- Global Security Database Tools☆42Updated last year
- ☆41Updated 3 months ago
- A project to visualize the software supply chain☆51Updated last year
- ☆19Updated 3 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆31Updated 3 years ago
- A fun POC that is built to understand AI security agents.☆30Updated 5 months ago
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆19Updated last year
- Autoconfigured ELK Stack That Contains All EPSS and NVD CVE Data☆51Updated last month
- An experimental project using LLM technology to generate security documentation for Open Source Software (OSS) projects☆28Updated 3 months ago
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆65Updated 11 months ago
- ☆12Updated 6 months ago
- Defending IaaS with ATT&CK is a project to create a collection of ATT&CK techniques relevant to a Linux IaaS environment, as well as a me…☆14Updated this week