mllamazares / STRIDE-vs-ASVSView external linksLinks
ποΈ equivalence table between OWASP ASVS standard and STRIDE threat modeling methodology.
β76Aug 22, 2024Updated last year
Alternatives and similar repositories for STRIDE-vs-ASVS
Users that are interested in STRIDE-vs-ASVS are comparing it to the libraries listed below
Sorting:
- A meta-database collecting resources that compile lists of breachesβ21Oct 30, 2025Updated 3 months ago
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrixβ59Sep 7, 2023Updated 2 years ago
- Provide some tips to handle Injection into application code (OWASP TOP 10 - A1).β10Nov 11, 2020Updated 5 years ago
- β20Jan 18, 2022Updated 4 years ago
- Simple tool to identify and remediate the use of the AWS EC2 IMDSv1.β15Aug 12, 2021Updated 4 years ago
- Useful scripts, Docker images, docker-compose apps, and Terraform modules.β149Feb 1, 2026Updated last week
- HashiCorp-relevant rules for the Semgrep code analysis toolβ41Oct 3, 2023Updated 2 years ago
- β124Nov 8, 2023Updated 2 years ago
- Salesforce Policy Deviation Checkerβ30Sep 30, 2020Updated 5 years ago
- Slack bot which promotes Defense in Depth/Zero Trust security practicesβ24Jan 17, 2023Updated 3 years ago
- CloudSplaining on AWS Managed Policiesβ44Sep 8, 2025Updated 5 months ago
- Compares and analyzes GCP IAM roles.β78Mar 9, 2025Updated 11 months ago
- Prevent SSRF attacks on AWS EC2 via automated upgrades to the more secure Instance Metadata Service v2 (IMDSv2).β143May 1, 2025Updated 9 months ago
- Semgrep rules corresponding to the OWASP ASVS standardβ27Nov 2, 2020Updated 5 years ago
- Volatile Artifact Collector collects a snapshot of volatile data from a system. It tells you what is happening on a system, and is of parβ¦β253Nov 18, 2024Updated last year
- The Security Champion Framework provides both a measuring stick and a roadmap generator for Champion Programs.β110Jan 16, 2024Updated 2 years ago
- Gram is Klarna's own threat model diagramming toolβ328Jan 26, 2026Updated 2 weeks ago
- β77Oct 16, 2022Updated 3 years ago
- Proof of concept code for Datadog Security Labs referenced exploits.β449Jan 8, 2026Updated last month
- Segment's Threat Modeling training for our engineersβ245May 4, 2021Updated 4 years ago
- Crowdsourced list of sensitive IAM Actionsβ159Oct 29, 2024Updated last year
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accountsβ61May 15, 2023Updated 2 years ago
- β226Dec 18, 2025Updated last month
- β25Jun 27, 2024Updated last year
- β72Oct 24, 2025Updated 3 months ago
- POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRFβ59Sep 20, 2023Updated 2 years ago
- A colour-coded radar chart to keep track of technologies in use, whether they are being evaluated, adopted or phased out.β14Jan 6, 2021Updated 5 years ago
- Unsafe Unpacking Vulnerability: Lab Code, Semgrep Rules and Secure Implementation Guideβ42Dec 16, 2024Updated last year
- We borrow the concept of 'personas' from UX/service design and apply it to threat actors to improve understanding between security, technβ¦β11Jun 17, 2020Updated 5 years ago
- A Continuous Threat Modeling methodologyβ324Jun 24, 2022Updated 3 years ago
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.β179Dec 11, 2025Updated 2 months ago
- Scan publicly accessible assets on your AWS cloud environmentβ136Jan 14, 2026Updated 3 weeks ago
- Semgrep-based Policy Controller for Kubernetesβ47Apr 4, 2025Updated 10 months ago
- Vendor Security Model Contractβ97Jul 3, 2022Updated 3 years ago
- Threat matrix for CI/CD Pipelineβ760Jul 8, 2024Updated last year
- Agile Threat Modeling Toolkitβ723Nov 20, 2025Updated 2 months ago
- Threatest is a CLI and Go framework for end-to-end testing threat detection rules.β339Updated this week
- Is your AWS perimeter secure? Use Powerpipe and Steampipe to check your AWS accounts for public resources, resources shared with untrustβ¦β114Sep 8, 2025Updated 5 months ago
- PEACH - a step-by-step framework for modeling and improving SaaS and PaaS tenant isolation, by managing the attack surface exposed by useβ¦β74Dec 14, 2022Updated 3 years ago