VerSprite / fork-communityLinks
Fork Threat Modeling Platform - Community
☆27Updated 3 months ago
Alternatives and similar repositories for fork-community
Users that are interested in fork-community are comparing it to the libraries listed below
Sorting:
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆68Updated 6 months ago
- A compilation of Software Supply Chain Security resources including initiatives, standards, regulations, organizations, vendors, tooling,…☆139Updated last year
- 🧪 Correlate Semgrep scans with Python test coverage to prioritize SAST findings and get bug fix suggestions via a self-hosted LLM.☆42Updated last year
- InfoSec OpenAI Examples☆19Updated 2 years ago
- ☆114Updated 2 years ago
- A project to visualize the software supply chain☆55Updated 2 years ago
- Dependency Combobulator☆95Updated 2 years ago
- Autoconfigured ELK Stack That Contains All EPSS and NVD CVE Data☆62Updated this week
- GCP GOAT is the vulnerable application for learn the GCP Security☆70Updated 7 months ago
- A small tool to help developers understand a huge set of security requirements from appsec teams☆47Updated 3 years ago
- Global Security Database Tools☆43Updated 2 years ago
- Tool to guess CPE name based on common software name☆109Updated 3 months ago
- Maturity Model Collaborative project☆15Updated 2 years ago
- Focused malicious code detection ruleset, with a high protection-to-noise ratio☆139Updated 10 months ago
- LLM Testing Findings Templates☆75Updated last year
- ☆44Updated 2 months ago
- 🖇️ equivalence table between OWASP ASVS standard and STRIDE threat modeling methodology.☆75Updated last year
- Create notes during a security code review in VSCode 📝 Import your favorite SAST tool findings 🛠️ and collaborate with others 🤝☆140Updated 2 months ago
- A fun POC that is built to understand AI security agents.☆34Updated 2 months ago
- Dragon-GPT uses Chat-GPT, or local LLM, to execute automatic and AI-powered threat modeling analysis on a given OWASP Threat Dragon diagr…☆41Updated 6 months ago
- Scanner to identify dangling DNS records and subdomain takeovers☆50Updated last year
- ☆20Updated 3 years ago
- A command line tool for detecting vulnerabilities in Python dependencies and doing safe package installs☆52Updated 2 years ago
- The IoT Security Testing Guide (ISTG) provides a comprehensive methodology for penetration tests in the IoT field, offering flexibility t…☆112Updated 5 months ago
- Manager of 14 third-party sources comprising approximately 4,000 Semgrep rules 🗂☆92Updated 2 weeks ago
- A community collection of security reviews of open source software components.☆96Updated last year
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆82Updated last year
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆99Updated 2 months ago
- A framework for understanding the capabilities of automated detection methods at identifying classes of application security vulnerabilit…☆32Updated last month
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆214Updated last week