Whitespots-OU / security-requirements-generator
A small tool to help developers understand a huge set of security requirements from appsec teams
โ45Updated 2 years ago
Alternatives and similar repositories for security-requirements-generator:
Users that are interested in security-requirements-generator are comparing it to the libraries listed below
- ๐๏ธ STRIDE vs. ASVS equivalence tableโ76Updated 7 months ago
- โ123Updated last year
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. โฆโ61Updated 8 months ago
- Semgrep rules corresponding to the OWASP ASVS standardโ27Updated 4 years ago
- The Security Champion Framework provides both a measuring stick and a roadmap generator for Champion Programs.โ107Updated last year
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.โ170Updated 4 months ago
- Create notes during a security code review in VSCode ๐ Import your favorite SAST tool findings ๐ ๏ธ and collaborate with others ๐คโ132Updated last week
- Dragon-GPT uses Chat-GPT, or local LLM, to execute automatic and AI-powered threat modeling analysis on a given OWASP Threat Dragon diagrโฆโ34Updated last month
- โ82Updated 3 years ago
- โ110Updated last year
- โ35Updated 3 years ago
- AI featured threat modeling and security review actionโ43Updated 4 months ago
- โ32Updated 3 years ago
- InfoSec OpenAI Examplesโ19Updated last year
- โ63Updated 2 years ago
- A step-by-step walkthrough of CloudGoat 2.0 scenarios.โ134Updated 4 years ago
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projectsโ58Updated last week
- An experimental project using LLM technology to generate security documentation for Open Source Software (OSS) projectsโ26Updated 3 weeks ago
- ๐งฎ An online calculator to assess the risk of web vulnerabilities based on OWASP Risk Assessmentโ156Updated 3 years ago
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagramsโ102Updated last month
- Presentations, training modules, and other education materials from Duo Security's Application Security team.โ73Updated 3 years ago
- NextJS-based single-page application for completing and reviewing SAMM assessmentsโ72Updated 2 years ago
- โ98Updated 2 weeks ago
- ๐งช Correlate Semgrep scans with Python test coverage to prioritize SAST findings and get bug fix suggestions via a self-hosted LLM.โ39Updated 3 months ago
- Threat Modeling Manifestoโ27Updated 8 months ago
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raiderโ138Updated 3 years ago
- The Open Security Summit is focused on the collaboration between, Developers and Application Securityโ45Updated 3 months ago
- The Pixi module is a MEAN Stack web app with wildly insecure APIs!โ123Updated 2 years ago
- GCP GOAT is the vulnerable application for learn the GCP Securityโ64Updated last year
- A full insecure kubernetes application for testing security toolsโ70Updated last week