appdefensealliance-dev / ASA
App Defense Alliance is now part of the Linux Foundation. The specs listed here are legacy specs part of Google programs. Check out the new Application Security Assessment (ASA) 1.0 specs at the link provided below.
☆74Updated 7 months ago
Alternatives and similar repositories for ASA:
Users that are interested in ASA are comparing it to the libraries listed below
- ☆87Updated 4 months ago
- Documentation of Semgrep: a fast, open-source, static analysis tool.☆39Updated this week
- OWASP Foundation Web Respository☆27Updated 5 months ago
- ☆91Updated 2 months ago
- InfoSec OpenAI Examples☆19Updated last year
- Microsoft Excel spreadsheets for consistent security evaluation of Android and iOS mobile applications☆50Updated 9 years ago
- Global IRT (Incident Response Team) is a project to describe common IRT and abuse contact information☆65Updated last year
- 🖇️ STRIDE vs. ASVS equivalence table☆75Updated 5 months ago
- Presentations, training modules, and other education materials from Duo Security's Application Security team.☆73Updated 3 years ago
- This repo contains the source for the CVE Services API.☆160Updated this week
- This repository contains a sample script which can be used to enable security vulnerability alerts in all of the repositories in a given …☆80Updated 3 months ago
- The Security Champion Framework provides both a measuring stick and a roadmap generator for Champion Programs.☆106Updated last year
- An Intentionally designed Vulnerable Android Application built in Kotlin.☆234Updated 2 years ago
- AppSecPipeline Specification for DevOps automation.☆38Updated 2 years ago
- A collection of Semgrep rules derived from the OWASP MASTG specifically for Android applications.☆264Updated 6 months ago
- (aka Kotlin Goat) - an intentionally vulnerable Kotlin application☆33Updated 9 months ago
- OWASP Foundation Web Respository☆66Updated 3 years ago
- OWASP Code Review Guide Web Repository☆129Updated 2 years ago
- Semgrep rules corresponding to the OWASP ASVS standard☆27Updated 4 years ago
- Desktop variant of OWASP Threat Dragon☆77Updated 3 years ago
- ☆28Updated 10 months ago
- The IoT Security Testing Guide (ISTG) provides a comprehensive methodology for penetration tests in the IoT field, offering flexibility t…☆93Updated 4 months ago
- ☆62Updated last year
- Application and Service Fingerprinting☆131Updated 2 years ago
- ☆26Updated 10 months ago
- NextJS-based single-page application for completing and reviewing SAMM assessments☆70Updated last year
- OWASP Threat Dragon core files☆11Updated 5 months ago
- ☆110Updated last year
- The Open Security Summit is focused on the collaboration between, Developers and Application Security☆45Updated last month
- ☆50Updated 3 years ago