Whitespots-OU / security-requirements-generatorLinks
A small tool to help developers understand a huge set of security requirements from appsec teams
โ46Updated 2 years ago
Alternatives and similar repositories for security-requirements-generator
Users that are interested in security-requirements-generator are comparing it to the libraries listed below
Sorting:
- ๐๏ธ STRIDE vs. ASVS equivalence tableโ76Updated 10 months ago
- The Security Champion Framework provides both a measuring stick and a roadmap generator for Champion Programs.โ108Updated last year
- โ123Updated last year
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. โฆโ65Updated 2 weeks ago
- Semgrep rules corresponding to the OWASP ASVS standardโ27Updated 4 years ago
- โ111Updated 2 years ago
- drHEADer helps with the audit of security headers received in response to a single request or a list of requests.โ110Updated 6 months ago
- โ88Updated 3 years ago
- โ66Updated 2 years ago
- โ35Updated 4 years ago
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.โ172Updated 7 months ago
- Protect against subdomain takeoverโ92Updated last year
- AI featured threat modeling and security review actionโ44Updated 7 months ago
- Create notes during a security code review in VSCode ๐ Import your favorite SAST tool findings ๐ ๏ธ and collaborate with others ๐คโ133Updated 3 months ago
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagramsโ105Updated 5 months ago
- Segment's Threat Modeling training for our engineersโ243Updated 4 years ago
- An extensive list of resources related to threat modelling. Gotta catch โem all!โ38Updated 5 months ago
- The Open Security Summit is focused on the collaboration between, Developers and Application Securityโ45Updated this week
- A step-by-step walkthrough of CloudGoat 2.0 scenarios.โ134Updated 5 years ago
- A comprehensive checklist and guide for organizations looking to implement a robust cybersecurity programโ40Updated last month
- InfoSec OpenAI Examplesโ19Updated last year
- NextJS-based single-page application for completing and reviewing SAMM assessmentsโ76Updated 2 years ago
- โ33Updated 3 years ago
- โ19Updated 3 years ago
- A simple web app that helps developers understand the ASVS requirements.โ158Updated 4 months ago
- Purposely vulnerable Java application to help lead secure coding workshopsโ184Updated last year
- ๐งฎ An online calculator to assess the risk of web vulnerabilities based on OWASP Risk Assessmentโ158Updated 3 years ago
- Presentations, training modules, and other education materials from Duo Security's Application Security team.โ74Updated 3 years ago
- A framework for understanding the capabilities of automated detection methods at identifying classes of application security vulnerabilitโฆโ15Updated last week
- The Pixi module is a MEAN Stack web app with wildly insecure APIs!โ128Updated 2 years ago