iriusrisk / startleftLinks
StartLeft is an automation tool for generating Threat Models written in the Open Threat Model (OTM) format from a variety of different sources such as IaC files, diagrams or projects exported from Threat Modelling tools.
☆52Updated this week
Alternatives and similar repositories for startleft
Users that are interested in startleft are comparing it to the libraries listed below
Sorting:
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆176Updated 9 months ago
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆66Updated 2 months ago
- Software Component Verification Standard (SCVS)☆149Updated 5 months ago
- ☆121Updated 2 weeks ago
- ☆33Updated 3 years ago
- Core model including reused documentation☆98Updated 3 months ago
- A comprehensive, systematic and actionable way to understand attacker behaviors and techniques with respect to the software supply chain☆95Updated 7 months ago
- OWASP Foundation Web Respository☆55Updated 2 years ago
- App that simplifies building decision trees to model adverse scenarios☆216Updated last year
- ☆67Updated last month
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆90Updated 2 weeks ago
- 🖇️ STRIDE vs. ASVS equivalence table☆76Updated last year
- A compilation of Software Supply Chain Security resources including initiatives, standards, regulations, organizations, vendors, tooling,…☆137Updated last year
- The Security Champion Framework provides both a measuring stick and a roadmap generator for Champion Programs.☆109Updated last year
- AI featured threat modeling and security review action☆45Updated 9 months ago
- Stakeholder-Specific Vulnerability Categorization☆163Updated this week
- A tool to check the security settings of Github Organizations.☆72Updated 2 years ago
- Examples on how to maintain security/compliance as code and to automate SecOps using the JupiterOne platform.☆54Updated last year
- Computer Aided Integration of Requirements and Information Security - Server☆164Updated last year
- ☆88Updated 4 years ago
- Project intended to make Attack Maps part of software development by reducing the time it takes to complete them.☆48Updated 8 years ago
- A small tool to help developers understand a huge set of security requirements from appsec teams☆47Updated 3 years ago
- ☆87Updated 10 months ago
- The Open Security Summit is focused on the collaboration between, Developers and Application Security☆45Updated 2 months ago
- Repository for on-going work as part of the SBOM for AI Tiger Team effort.☆39Updated last month
- An online multiplayer version of the Elevation of Privilege (EoP) threat modeling card game☆147Updated last month
- OWASP Foundation Threat Dragon Project Web Repository☆82Updated last week
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆79Updated last year
- ☆38Updated 8 months ago
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆209Updated this week