☆35May 13, 2021Updated 4 years ago
Alternatives and similar repositories for ASVS-Agile-Delivery-Guide
Users that are interested in ASVS-Agile-Delivery-Guide are comparing it to the libraries listed below
Sorting:
- ☆20Jan 18, 2022Updated 4 years ago
- A full example report☆11Jul 23, 2019Updated 6 years ago
- A Windows PowerShell & PowerShell Core Module to calculate a CVSS3 Score based on a Vector string☆12Dec 20, 2022Updated 3 years ago
- Repository for the Open Information Security Risk Universe☆64Jul 10, 2022Updated 3 years ago
- Various scripts to help you out. Mostly very scrappy, but functional. I realise Write-Host is not the way to do things, but I wrote som…☆27May 13, 2022Updated 3 years ago
- ☆124Nov 8, 2023Updated 2 years ago
- ☆17Nov 21, 2016Updated 9 years ago
- Threat Mitigation Strategies☆28Feb 18, 2026Updated 2 weeks ago
- ☆18Apr 21, 2020Updated 5 years ago
- A MAL language that demonstrates the Maven project structure☆23Feb 27, 2026Updated last week
- Fork Threat Modeling Platform - Community☆27Oct 10, 2025Updated 4 months ago
- Segment's Threat Modeling training for our engineers☆245May 4, 2021Updated 4 years ago
- PowerShell & Python: A side-by-side comparison☆28Aug 10, 2020Updated 5 years ago
- Public tables and other research that can accept PRs. Please visit the web link.☆44Aug 30, 2019Updated 6 years ago
- An extensed and updated cheat for Warcraft III☆11Mar 7, 2022Updated 4 years ago
- Scripts for accessing and transforming cyber threat intelligence☆26Nov 22, 2015Updated 10 years ago
- Interactive IPython Notebook to demonstrate OWASP ZAP's API and Scripting Functions - OWASP ZAP 2.8.0☆41Dec 8, 2022Updated 3 years ago
- OWASP Application Security Verification Standard 4.0 Checklist☆33Apr 15, 2019Updated 6 years ago
- Scala framework for collecting performance metrics and conducting sound experimental benchmarking.☆13Nov 19, 2025Updated 3 months ago
- OWASP Ontology-driven Threat Modelling framework☆40Jul 11, 2023Updated 2 years ago
- Security Content for the PEAK Threat Hunting Framework☆44Feb 15, 2024Updated 2 years ago
- Semgrep rules corresponding to the OWASP ASVS standard☆27Nov 2, 2020Updated 5 years ago
- A Continuous Threat Modeling methodology☆324Jun 24, 2022Updated 3 years ago
- 🖇️ equivalence table between OWASP ASVS standard and STRIDE threat modeling methodology.☆76Aug 22, 2024Updated last year
- Small python script wrapper for automating hashcat commands☆38Dec 20, 2020Updated 5 years ago
- EncryCore node reference implementation☆15Apr 2, 2020Updated 5 years ago
- Talk slides and material☆37Mar 24, 2024Updated last year
- Simple examples of using Java Libraries☆12Sep 1, 2022Updated 3 years ago
- Microsoft-Defender-for-IoT☆14May 26, 2025Updated 9 months ago
- We borrow the concept of 'personas' from UX/service design and apply it to threat actors to improve understanding between security, techn…☆11Jun 17, 2020Updated 5 years ago
- How to create VMware vagrant box☆11May 10, 2020Updated 5 years ago
- German translation of the Microsoft Elevation of Privilege card game along with notes and examples☆10Jan 9, 2016Updated 10 years ago
- ☆13Feb 12, 2017Updated 9 years ago
- Some YARA rules i will add from time to time☆12May 31, 2019Updated 6 years ago
- Serviço para gerar os arquivos APIX001 e APIX002 do Arranjo de Pagamentos Pix☆10Feb 11, 2023Updated 3 years ago
- PowerShell tool to enumerate existing exclusions in Windows Defender as low privileged user☆11Oct 14, 2024Updated last year
- Api flask, Desktop C++ e Página web em Flask☆15Apr 19, 2021Updated 4 years ago
- ☆10Jul 1, 2023Updated 2 years ago
- Fix for the CVE-2021-36934☆10Oct 15, 2021Updated 4 years ago