A small tool to help developers understand a huge set of security requirements from appsec teams
☆46Sep 2, 2022Updated 3 years ago
Alternatives and similar repositories for security-requirements-generator
Users that are interested in security-requirements-generator are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An extensive list of resources related to threat modelling. Gotta catch ’em all!☆45Updated this week
- ☆35May 13, 2021Updated 4 years ago
- The Secure Coding Practices Quick-reference Guide from OWASP☆44Mar 14, 2026Updated last week
- AI featured threat modeling and security review project☆17Nov 17, 2024Updated last year
- Redis Security Map - Anti-hacking for Redis☆31Mar 11, 2022Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Regex patterns for manual application source code review☆33Dec 14, 2020Updated 5 years ago
- Segment's Threat Modeling training for our engineers☆245May 4, 2021Updated 4 years ago
- Dragon-GPT uses Chat-GPT, or local LLM, to execute automatic and AI-powered threat modeling analysis on a given OWASP Threat Dragon diagr…☆41Jun 20, 2025Updated 9 months ago
- NextJS-based single-page application for completing and reviewing SAMM assessments☆79Mar 20, 2023Updated 3 years ago
- Security Champions Playbook v 2.1☆392Sep 25, 2023Updated 2 years ago
- Application Security pipelines☆51May 25, 2022Updated 3 years ago
- ☆22Apr 17, 2023Updated 2 years ago
- Awesome Secure Coding☆18Feb 13, 2026Updated last month
- Automatic tool using for crawling code to find low-hang fruit vulnerabilities - Based on OWASP Secure Code Review Guide☆21Aug 31, 2020Updated 5 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Research Links for LLM Security☆17May 27, 2024Updated last year
- OWASP SecurityRAT (version 1.x) - Tool for handling security requirements in development☆187Aug 28, 2025Updated 7 months ago
- A collection of permissively licensed Semgrep rules.☆22Jul 5, 2024Updated last year
- Autogrep automates Semgrep rule generation and filtering by using LLMs to analyze vulnerability patches, enabling automatic creation of h…☆76Feb 27, 2025Updated last year
- Http Security Headers Checker Tool written in PHP Cli + Useful Tips to set Http Security Headers☆10Mar 27, 2021Updated 5 years ago
- Repositório de estudo em pt-br de InfoSec☆32Nov 2, 2025Updated 4 months ago
- Presentations, training modules, and other education materials from Duo Security's Application Security team.☆76Jul 15, 2021Updated 4 years ago
- Learning playground for Argus-SAF☆10Dec 27, 2018Updated 7 years ago
- A PoC to Simulate Ransomware Attack on AWS Environment☆33Oct 14, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Secure-D Web Application Security Test Checklist summarizes well-known weaknesses, vulnerabilities and best practices into review topics …☆21Sep 21, 2020Updated 5 years ago
- NIVA is a simple web application which is intentionally vulnerable to NoSQL injection. The purpose of this project is to facilitate a bet…☆19Nov 21, 2022Updated 3 years ago
- The command-line client for Journal☆12Oct 26, 2024Updated last year
- ☆35Dec 10, 2020Updated 5 years ago
- Revok is an online self-service web application security scanner, finding common web security issues with minimal cost.☆17May 13, 2015Updated 10 years ago
- The SaaS CTO Security Checklist Redux, The DevOps Security Checklist, and The Personal Infosec & Security Checklist☆24Jul 9, 2021Updated 4 years ago
- The Security Champion Framework provides both a measuring stick and a roadmap generator for Champion Programs.☆110Jan 16, 2024Updated 2 years ago
- Estudos do quarto é um projeto que visa fazer resumos das matérias para os alunos, complementendo a explicação do professor que é dada em…☆16Jan 4, 2025Updated last year
- A Network access firewall for Unix like OS and specifically supports Raspberry Pi 3 .☆11Feb 25, 2018Updated 8 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆181Dec 11, 2025Updated 3 months ago
- An python script that use apkleaks to scan the android application over web☆11Jun 2, 2022Updated 3 years ago
- 🖇️ equivalence table between OWASP ASVS standard and STRIDE threat modeling methodology.☆76Aug 22, 2024Updated last year
- Get new vulnerability alerts daily straight to your slack channel using GitHub Actions.☆16Jan 15, 2026Updated 2 months ago
- Fork Threat Modeling Platform - Community☆28Oct 10, 2025Updated 5 months ago
- A project in Golang that will create prefix-based magic MD5 hashes for type juggling.☆21Jul 29, 2018Updated 7 years ago
- Repo to hold mapping of user-security-stories☆120Nov 28, 2018Updated 7 years ago