google / vsaqLinks
VSAQ is an interactive questionnaire application to assess the security programs of third parties.
☆854Updated 4 years ago
Alternatives and similar repositories for vsaq
Users that are interested in vsaq are comparing it to the libraries listed below
Sorting:
- goSDL☆522Updated 2 years ago
- SeaSponge is an accessible threat modelling tool from Mozilla☆279Updated 7 years ago
- ☆816Updated 8 years ago
- (DEPRECATED) Diffy is a triage tool used during cloud-centric security incidents, to help digital forensics and incident response (DFIR)…☆632Updated last year
- An open source, online threat modelling tool from OWASP☆486Updated last month
- SAMM stands for Software Assurance Maturity Model.☆396Updated 3 years ago
- ThreadFix is a software vulnerability management platform. This GitHub site is far out of date. Please go to www.threadfix.it for up-to-d…☆341Updated 2 years ago
- Distributed alerting for the masses!☆992Updated 6 years ago
- Node application to help managing Maturity Models like the ones created by BSIMM and OpenSAMM☆195Updated 7 years ago
- Python installable command line utiltity for mitigation of host and key compromises.☆347Updated 4 years ago
- an osquery fleet manager☆618Updated 2 years ago
- a ruggedization framework that embodies the principle "be mean to your code"☆992Updated 3 years ago
- Security Documentation Builder☆367Updated last year
- An installable desktop variant of OWASP Threat Dragon☆592Updated 2 weeks ago
- An application to assist in the organization and prioritization of software security activities.☆139Updated 4 years ago
- Mittn: Security test tool runner for test automation in CI☆196Updated last year
- Application Security Automation☆527Updated last year
- DEPRECATED - MozDef: Mozilla Enterprise Defense Platform☆2,171Updated 3 years ago
- Find interesting and potentially hazardous commits in git projects☆354Updated 6 years ago
- Home to public development of NIST Special Publication 800-63-3: Digital Authentication Guidelines☆719Updated this week
- Scan domains and return data based on HTTPS best practices☆687Updated 3 weeks ago
- KPN Security Policy☆147Updated 4 years ago
- A toolkit for building self-defending applications through real-time event detection and response☆284Updated 2 years ago
- Jackhammer - One Security vulnerability assessment/management tool to solve all the security team problems.☆738Updated last year
- Easy automated vulnerability scanning, reporting and analysis☆707Updated 5 years ago
- An observatory for TLS configurations, X509 certificates, and more.☆540Updated 3 months ago
- Security auditing tool for AWS environments☆1,729Updated 6 years ago
- The Elevation of Privilege Threat Modeling Game☆336Updated last year
- A Continuous Threat Modeling methodology☆324Updated 3 years ago
- Vendor Security Model Contract☆98Updated 3 years ago