mike-goodwin / owasp-threat-dragon-desktop
An installable desktop variant of OWASP Threat Dragon
☆594Updated 6 months ago
Alternatives and similar repositories for owasp-threat-dragon-desktop
Users that are interested in owasp-threat-dragon-desktop are comparing it to the libraries listed below
Sorting:
- An open source, online threat modelling tool from OWASP☆483Updated 10 months ago
- SAMM stands for Software Assurance Maturity Model.☆399Updated 2 years ago
- threatspec - continuous threat modeling, through code☆357Updated 4 years ago
- This project is about creating and publishing threat model examples.☆419Updated 3 years ago
- A unified DevSecOps Framework that allows you to go from iterative, collaborative Threat Modeling to Application Security Test Orchestrat…☆279Updated last month
- Create actionable data from your Vulnerability Scans☆1,379Updated 2 years ago
- An information security preparedness tool to do adversarial simulation.☆1,122Updated 6 years ago
- The Secure Coding Framework☆268Updated 4 years ago
- OWASP Cloud Security - Enabling conversations through threat and control stories☆179Updated 6 years ago
- Draw.io libraries for threat modeling diagrams☆743Updated 4 years ago
- A Continuous Threat Modeling methodology☆319Updated 2 years ago
- A Pythonic framework for threat modeling☆996Updated 2 months ago
- Agile Threat Modeling Toolkit☆665Updated 2 weeks ago
- A simple web app that helps developers understand the ASVS requirements.☆157Updated 2 months ago
- WeirdAAL (AWS Attack Library)☆804Updated 4 months ago
- Application Security Automation☆528Updated last year
- Watchdog - A Comprehensive Security Scanning and a Vulnerability Management Tool.☆418Updated 6 years ago
- The GOSINT framework is a project used for collecting, processing, and exporting high quality indicators of compromise (IOCs).☆544Updated 2 years ago
- Dradis Framework: Collaboration and reporting for IT Security teams☆705Updated this week
- a Damn Vulnerable Serverless Application☆541Updated last year
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,273Updated 3 months ago
- Cloud-related research releases from the Rhino Security Labs team.☆386Updated 5 years ago
- Node application to help managing Maturity Models like the ones created by BSIMM and OpenSAMM☆194Updated 6 years ago
- Burp-Automator: A Burp Suite Automation Tool with Slack Integration. It can be used with Jenkins and Selenium to automate Dynamic Applica…☆480Updated 6 years ago
- A tool designed to assist with finding all sinks and sources of a web application and display these results in a digestible manner.☆560Updated 2 years ago
- Easy automated vulnerability scanning, reporting and analysis☆701Updated 5 years ago
- REST/JSON API to the Burp Suite security tool.☆560Updated 11 months ago
- Imperva's customizable API attack tool takes an API specification as an input, generates and runs attacks that are based on it as an outp…☆472Updated 2 years ago
- Exploits written by the Rhino Security Labs team☆1,076Updated 4 years ago
- Scan your code for security misconfiguration, search for passwords and secrets.☆646Updated last year