A small tool to help developers understand a huge set of security requirements from appsec teams
☆46Sep 2, 2022Updated 3 years ago
Alternatives and similar repositories for security-requirements-generator
Users that are interested in security-requirements-generator are comparing it to the libraries listed below
Sorting:
- Simple mind maps for IoT security attack surfaces and methodologies☆17Aug 12, 2019Updated 6 years ago
- The Secure Coding Practices Quick-reference Guide from OWASP☆44Aug 13, 2025Updated 6 months ago
- A collection of permissively licensed Semgrep rules.☆22Jul 5, 2024Updated last year
- Redis Security Map - Anti-hacking for Redis☆31Mar 11, 2022Updated 3 years ago
- AI featured threat modeling and security review project☆17Nov 17, 2024Updated last year
- CVE-2020-28243 Local Privledge Escalation Exploit in SaltStack Minion☆18Mar 3, 2021Updated 5 years ago
- All Labs of the Security for Developers Training☆10Feb 10, 2023Updated 3 years ago
- ☆124Nov 8, 2023Updated 2 years ago
- Java* Fuzzer for Android*☆12Nov 3, 2016Updated 9 years ago
- ☆35May 13, 2021Updated 4 years ago
- Research Links for LLM Security☆17May 27, 2024Updated last year
- Awesome Secure Coding☆18Feb 13, 2026Updated 3 weeks ago
- A file system that mutates files☆14Jul 20, 2020Updated 5 years ago
- ☆21Apr 17, 2023Updated 2 years ago
- Secure-D Web Application Security Test Checklist summarizes well-known weaknesses, vulnerabilities and best practices into review topics …☆21Sep 21, 2020Updated 5 years ago
- A project in Golang that will create prefix-based magic MD5 hashes for type juggling.☆20Jul 29, 2018Updated 7 years ago
- Python script to generate a malicious MP4 file and start a CherryPy web server hosting a simple HTML page with the embedded file. Exploi…☆17Dec 8, 2015Updated 10 years ago
- Security Champions Playbook v 2.1☆392Sep 25, 2023Updated 2 years ago
- NextJS-based single-page application for completing and reviewing SAMM assessments☆79Mar 20, 2023Updated 2 years ago
- Segment's Threat Modeling training for our engineers☆245May 4, 2021Updated 4 years ago
- Presentations, training modules, and other education materials from Duo Security's Application Security team.☆76Jul 15, 2021Updated 4 years ago
- Autogrep automates Semgrep rule generation and filtering by using LLMs to analyze vulnerability patches, enabling automatic creation of h…☆73Feb 27, 2025Updated last year
- PowerShell script for hardening GE digital CIMPLICITY servers☆23Aug 12, 2021Updated 4 years ago
- Automatic tool using for crawling code to find low-hang fruit vulnerabilities - Based on OWASP Secure Code Review Guide☆21Aug 31, 2020Updated 5 years ago
- OWASP SecurityRAT (version 1.x) - Tool for handling security requirements in development☆186Aug 28, 2025Updated 6 months ago
- Embedded AppSec Best Practices☆45Oct 22, 2025Updated 4 months ago
- Elevation of MLsec: a threat-modeling card game for machine learning systems☆31Nov 24, 2025Updated 3 months ago
- Fork Threat Modeling Platform - Community☆27Oct 10, 2025Updated 4 months ago
- Vulnerable webapp testbed☆24May 11, 2016Updated 9 years ago
- Define AWS CDK applications declaratively☆61Apr 4, 2025Updated 11 months ago
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆181Dec 11, 2025Updated 2 months ago
- Repository for my talk on Desktop Bridge at Zer0Con 2018.☆34Mar 30, 2018Updated 7 years ago
- ☆11Feb 10, 2026Updated 3 weeks ago
- Here are some common interview questions for an application security position you can review for your own interview, along with example a…☆31Apr 17, 2022Updated 3 years ago
- Practical Library Of Threats 4 Artificial Intelligence☆36Jun 19, 2025Updated 8 months ago
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆69Jun 25, 2025Updated 8 months ago
- Agile Threat Modeling Toolkit☆727Nov 20, 2025Updated 3 months ago
- ☆56Updated this week
- A tool for automated security scanning of web applications. Many features are also present for manual penetration testing.☆30Aug 29, 2014Updated 11 years ago