VerSprite / fork-community
Fork Threat Modeling Platform - Community
☆19Updated last month
Alternatives and similar repositories for fork-community
Users that are interested in fork-community are comparing it to the libraries listed below
Sorting:
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆64Updated 10 months ago
- InfoSec OpenAI Examples☆19Updated last year
- ☆10Updated 3 years ago
- 🧪 Correlate Semgrep scans with Python test coverage to prioritize SAST findings and get bug fix suggestions via a self-hosted LLM.☆39Updated 5 months ago
- Autoconfigured ELK Stack That Contains All EPSS and NVD CVE Data☆51Updated 2 weeks ago
- PEACH - a step-by-step framework for modeling and improving SaaS and PaaS tenant isolation, by managing the attack surface exposed by use…☆70Updated 2 years ago
- A project to visualize the software supply chain☆50Updated last year
- boostsecurityio/lotp☆125Updated last month
- ☆35Updated 4 years ago
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆41Updated last year
- 🖇️ STRIDE vs. ASVS equivalence table☆76Updated 8 months ago
- Maturity Model Collaborative project☆15Updated 2 years ago
- A command line tool for detecting vulnerabilities in Python dependencies and doing safe package installs☆51Updated 2 years ago
- WAF bypass PoC☆47Updated last year
- ☆30Updated last month
- Demonstrates how a malicious dependency could negatively impact the build output.☆26Updated last year
- This terraform provider can be used to get remote code execution by injecting a dummy resource in a writeable state file.☆54Updated 3 months ago
- Create notes during a security code review in VSCode 📝 Import your favorite SAST tool findings 🛠️ and collaborate with others 🤝☆133Updated last month
- ☆110Updated last year
- Dragon-GPT uses Chat-GPT, or local LLM, to execute automatic and AI-powered threat modeling analysis on a given OWASP Threat Dragon diagr…☆35Updated 2 months ago
- Run Capture the Flags and Security Trainings with OWASP WrongSecrets☆46Updated this week
- ☆35Updated 9 months ago
- Dependency Combobulator☆93Updated last year
- Nuclei plugins to audit Chrome extensions☆64Updated 10 months ago
- StartLeft is an automation tool for generating Threat Models written in the Open Threat Model (OTM) format from a variety of different so…☆50Updated this week
- GCP GOAT is the vulnerable application for learn the GCP Security☆64Updated last year
- Tool for obfuscating and deobfuscating data.☆70Updated last year
- Manager of third-party sources of Semgrep rules 🗂☆82Updated 9 months ago
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆76Updated last week
- Clean accounts over permissions in GCP infra at scale☆71Updated 2 years ago