iriusrisk / startleft
StartLeft is an automation tool for generating Threat Models written in the Open Threat Model (OTM) format from a variety of different sources such as IaC files, diagrams or projects exported from Threat Modelling tools.
☆49Updated this week
Alternatives and similar repositories for startleft:
Users that are interested in startleft are comparing it to the libraries listed below
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆61Updated 8 months ago
- ☆95Updated last week
- Software Component Verification Standard (SCVS)☆141Updated 10 months ago
- ☆32Updated 2 years ago
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆171Updated 3 months ago
- OWASP Foundation Web Respository☆27Updated 6 months ago
- The Security Champion Framework provides both a measuring stick and a roadmap generator for Champion Programs.☆107Updated last year
- 🖇️ STRIDE vs. ASVS equivalence table☆75Updated 6 months ago
- Threat Modeling Manifesto☆27Updated 7 months ago
- Repository for on-going work as part of the AIBOM Tiger Team effort.☆19Updated 5 months ago
- OWASP Foundation Web Respository☆55Updated last year
- ☆63Updated 2 years ago
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆58Updated last year
- ☆16Updated last year
- Systematic Universal Security Testing Orchestration☆37Updated 2 years ago
- OWASP Foundation Web Respository☆28Updated 2 years ago
- Examples on how to maintain security/compliance as code and to automate SecOps using the JupiterOne platform.☆53Updated last year
- A comprehensive, systematic and actionable way to understand attacker behaviors and techniques with respect to the software supply chain☆91Updated 2 weeks ago
- ☆35Updated 3 years ago
- AI featured threat modeling and security review action☆43Updated 3 months ago
- A standard API specification for exchanging supply chain artifacts and intelligence☆73Updated this week
- A community collection of security reviews of open source software components.☆93Updated last year
- A full insecure kubernetes application for testing security tools☆68Updated this week
- ☆10Updated 2 years ago
- ☆82Updated 3 years ago
- Stakeholder-Specific Vulnerability Categorization☆137Updated this week
- ☆25Updated last year
- A small tool to help developers understand a huge set of security requirements from appsec teams☆45Updated 2 years ago
- DefectDojo Community Content☆17Updated 4 months ago
- Examples and proof-of-concept for Software Bill of Materials (SBOM) code & data☆57Updated 10 months ago