mike-goodwin / owasp-threat-dragon-desktopLinks
An installable desktop variant of OWASP Threat Dragon
☆592Updated last week
Alternatives and similar repositories for owasp-threat-dragon-desktop
Users that are interested in owasp-threat-dragon-desktop are comparing it to the libraries listed below
Sorting:
- An open source, online threat modelling tool from OWASP☆486Updated last month
- SAMM stands for Software Assurance Maturity Model.☆396Updated 3 years ago
- Draw.io libraries for threat modeling diagrams☆765Updated 4 years ago
- The Secure Coding Framework☆267Updated 5 years ago
- A unified DevSecOps Framework that allows you to go from iterative, collaborative Threat Modeling to Application Security Test Orchestrat…☆282Updated 2 weeks ago
- threatspec - continuous threat modeling, through code☆366Updated 4 years ago
- Create actionable data from your Vulnerability Scans☆1,391Updated 2 years ago
- Security Knowledge Framework (SKF) Python Flask / Angular project☆819Updated last year
- This project is about creating and publishing threat model examples.☆423Updated 3 years ago
- Watchdog - A Comprehensive Security Scanning and a Vulnerability Management Tool.☆421Updated 7 years ago
- A simple web app that helps developers understand the ASVS requirements.☆159Updated 6 months ago
- A Pythonic framework for threat modeling☆1,029Updated 2 months ago
- The GOSINT framework is a project used for collecting, processing, and exporting high quality indicators of compromise (IOCs).☆550Updated 2 years ago
- Node application to help managing Maturity Models like the ones created by BSIMM and OpenSAMM☆195Updated 7 years ago
- OWASP SecurityRAT (version 1.x) - Tool for handling security requirements in development☆183Updated 2 weeks ago
- Agile Threat Modeling Toolkit☆689Updated last month
- An information security preparedness tool to do adversarial simulation.☆1,132Updated 6 years ago
- The Correlated CVE Vulnerability And Threat Intelligence Database API☆948Updated 4 years ago
- Open source security career ladders☆116Updated 2 years ago
- Repo to hold mapping of user-security-stories☆119Updated 6 years ago
- Application Security Automation☆527Updated last year
- A Continuous Threat Modeling methodology☆324Updated 3 years ago
- Container Security Verification Standard☆58Updated 6 years ago
- Jackhammer - One Security vulnerability assessment/management tool to solve all the security team problems.☆738Updated last year
- goSDL☆522Updated 2 years ago
- OWASP Cloud Security - Enabling conversations through threat and control stories☆181Updated 6 years ago
- OWASP ASVS checklist for audits☆207Updated last year
- PatrOwl - Open Source, Smart and Scalable Security Operations Orchestration Platform☆637Updated last week
- Easy automated vulnerability scanning, reporting and analysis☆707Updated 5 years ago
- barq: The AWS Cloud Post Exploitation framework!☆387Updated 2 years ago