Risk-Assessment-Framework / RiskAssessmentFramework
The Secure Coding Framework
☆20Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for RiskAssessmentFramework
- OWASP Foundation Web Respository☆27Updated last year
- Raf Scanner IDE☆10Updated last year
- OWASP Foundation Web Respository☆27Updated 3 months ago
- OWASP Foundation Web Respository☆17Updated last year
- InfoSec OpenAI Examples☆19Updated 11 months ago
- OWASP Foundation Web Respository☆40Updated last year
- Threat Modeling Manifesto☆27Updated 4 months ago
- ☆37Updated 7 months ago
- The Open Security Summit is focused on the collaboration between, Developers and Application Security☆45Updated this week
- CVSS v4.0 calculator☆25Updated 3 months ago
- GitHub action to run Threagile, the agile threat modeling toolkit, on a repo's threagile.yaml file☆13Updated 6 months ago
- Exploit Prediction Scoring System (EPSS)☆23Updated 2 years ago
- The OWASP Vulnerable Web Applications Directory Project (VWAD) is a comprehensive and well maintained registry of all known vulnerable we…☆21Updated 3 weeks ago
- ☆25Updated 7 months ago
- OWASP Foundation Web Respository☆10Updated last year
- ☆30Updated 2 years ago
- A Crowdsourcing Exchange for mapping various sources of security vulnerabilities, exposures, threats, and controls data☆26Updated 5 years ago
- ☆14Updated last year
- GCP GOAT is the vulnerable application for learn the GCP Security☆62Updated last year
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆61Updated this week
- A collection of data fetchers, and simple quarterly and yearly CVE forecasting models.☆36Updated last year
- The Secure Coding Practices Quick-reference Guide from OWASP☆32Updated 11 months ago
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆55Updated 4 months ago
- DLT-Security-Framework☆18Updated 3 years ago
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆17Updated last year
- AI featured threat modeling and security review action☆40Updated last week
- Learn AWS Security by Example☆18Updated 2 years ago
- 📚A curated list of product security resources.☆18Updated 2 years ago
- Advisories, guidance, best practice documents and more issued by members of the EU CSIRTs network, a network composed of EU Member States…☆52Updated 2 weeks ago
- AI featured threat modeling and security review project☆12Updated last week