Whitespots-OU / security-requirements-generatorLinks
A small tool to help developers understand a huge set of security requirements from appsec teams
โ47Updated 3 years ago
Alternatives and similar repositories for security-requirements-generator
Users that are interested in security-requirements-generator are comparing it to the libraries listed below
Sorting:
- ๐๏ธ equivalence table between OWASP ASVS standard and STRIDE threat modeling methodology.โ76Updated last year
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. โฆโ68Updated 7 months ago
- The Security Champion Framework provides both a measuring stick and a roadmap generator for Champion Programs.โ110Updated 2 years ago
- โ124Updated 2 years ago
- Semgrep rules corresponding to the OWASP ASVS standardโ27Updated 5 years ago
- โ69Updated 6 months ago
- โ88Updated 4 years ago
- AI featured threat modeling and security review actionโ45Updated last year
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.โ179Updated last month
- Presentations, training modules, and other education materials from Duo Security's Application Security team.โ76Updated 4 years ago
- โ114Updated 2 years ago
- Create notes during a security code review in VSCode ๐ Import your favorite SAST tool findings ๐ ๏ธ and collaborate with others ๐คโ141Updated 3 months ago
- ๐งฎ An online calculator to assess the risk of web vulnerabilities based on OWASP Risk Assessmentโ163Updated 4 years ago
- Segment's Threat Modeling training for our engineersโ245Updated 4 years ago
- materials we hand outโ147Updated 6 months ago
- โ35Updated 4 years ago
- โ61Updated 8 months ago
- โ20Updated 4 years ago
- โ35Updated 5 years ago
- ๐งช Correlate Semgrep scans with Python test coverage to prioritize SAST findings and get bug fix suggestions via a self-hosted LLM.โ42Updated last year
- The Open Security Summit is focused on the collaboration between, Developers and Application Securityโ45Updated 6 months ago
- drHEADer helps with the audit of security headers received in response to a single request or a list of requests.โ112Updated last year
- โ35Updated 3 years ago
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagramsโ106Updated last year
- A compilation of Software Supply Chain Security resources including initiatives, standards, regulations, organizations, vendors, tooling,โฆโ139Updated 2 years ago
- NextJS-based single-page application for completing and reviewing SAMM assessmentsโ79Updated 2 years ago
- LLM Testing Findings Templatesโ75Updated last year
- InfoSec OpenAI Examplesโ19Updated 2 years ago
- Purposely vulnerable Java application to help lead secure coding workshopsโ191Updated last year
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projectsโ102Updated 3 months ago