Risk-Assessment-Framework / RiskAssessmentFramework
The Secure Coding Framework
☆22Updated 4 years ago
Alternatives and similar repositories for RiskAssessmentFramework:
Users that are interested in RiskAssessmentFramework are comparing it to the libraries listed below
- OWASP Foundation Web Respository☆31Updated 2 years ago
- Raf Scanner IDE☆10Updated 2 years ago
- OWASP Foundation Web Respository☆18Updated 2 years ago
- Threat Modeling Manifesto☆28Updated 9 months ago
- InfoSec OpenAI Examples☆19Updated last year
- OWASP Foundation Web Respository☆10Updated last year
- OWASP Foundation Web Respository☆28Updated 8 months ago
- CVSS v4.0 calculator☆30Updated 8 months ago
- A fun POC that is built to understand AI security agents.☆31Updated 4 months ago
- StartLeft is an automation tool for generating Threat Models written in the Open Threat Model (OTM) format from a variety of different so…☆50Updated last week
- GitHub action to run Threagile, the agile threat modeling toolkit, on a repo's threagile.yaml file☆13Updated last year
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆63Updated 10 months ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆31Updated 3 years ago
- ☆41Updated 2 months ago
- Maturity Model Collaborative project☆15Updated 2 years ago
- Global Security Database Tools☆42Updated last year
- ☆10Updated 2 years ago
- An experimental project using LLM technology to generate security documentation for Open Source Software (OSS) projects☆28Updated 2 months ago
- The Open Security Summit is focused on the collaboration between, Developers and Application Security☆45Updated 4 months ago
- ☆27Updated last year
- ATT&CK Sync is a Center for Threat-Informed Defense project that aims to improve the ability for organizations to consume MITRE ATT&CK® v…☆20Updated 2 weeks ago
- Automated process to build and distribute Posture & Exposure Reports' bi-weekly to customers.☆17Updated last year
- Holds the public Hacking the Cloud CTFs.☆56Updated last year
- Run Capture the Flags and Security Trainings with OWASP WrongSecrets☆46Updated this week
- ☆102Updated last week
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆19Updated last year
- Autoconfigured ELK Stack That Contains All EPSS and NVD CVE Data☆50Updated this week
- 📚A curated list of product security resources.☆19Updated 2 years ago
- Dragon-GPT uses Chat-GPT, or local LLM, to execute automatic and AI-powered threat modeling analysis on a given OWASP Threat Dragon diagr…☆35Updated 2 months ago
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆75Updated last year