ποΈ equivalence table between OWASP ASVS standard and STRIDE threat modeling methodology.
β76Aug 22, 2024Updated last year
Alternatives and similar repositories for STRIDE-vs-ASVS
Users that are interested in STRIDE-vs-ASVS are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Provide some tips to handle Injection into application code (OWASP TOP 10 - A1).β10Nov 11, 2020Updated 5 years ago
- Assess certain AWS network configurationsβ12Aug 22, 2018Updated 7 years ago
- HashiCorp-relevant rules for the Semgrep code analysis toolβ41Oct 3, 2023Updated 2 years ago
- Simple tool to identify and remediate the use of the AWS EC2 IMDSv1.β15Aug 12, 2021Updated 4 years ago
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrixβ59Sep 7, 2023Updated 2 years ago
- Open source password manager - Proton Pass β’ AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. β¦β70Jun 25, 2025Updated 9 months ago
- β125Nov 8, 2023Updated 2 years ago
- A meta-database collecting resources that compile lists of breachesβ21Oct 30, 2025Updated 4 months ago
- Semgrep rules corresponding to the OWASP ASVS standardβ27Nov 2, 2020Updated 5 years ago
- A colour-coded radar chart to keep track of technologies in use, whether they are being evaluated, adopted or phased out.β14Jan 6, 2021Updated 5 years ago
- β20Jan 18, 2022Updated 4 years ago
- Proof of concept code for Datadog Security Labs referenced exploits.β449Mar 9, 2026Updated 2 weeks ago
- Slack bot which promotes Defense in Depth/Zero Trust security practicesβ24Jan 17, 2023Updated 3 years ago
- Useful scripts, Docker images, docker-compose apps, and Terraform modules.β149Mar 15, 2026Updated last week
- Open source password manager - Proton Pass β’ AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Segment's Threat Modeling training for our engineersβ245May 4, 2021Updated 4 years ago
- Compares and analyzes GCP IAM roles.β78Mar 9, 2025Updated last year
- Gram is Klarna's own threat model diagramming toolβ331Updated this week
- β35Mar 8, 2022Updated 4 years ago
- Agile Threat Modeling Toolkitβ737Mar 12, 2026Updated 2 weeks ago
- PEACH - a step-by-step framework for modeling and improving SaaS and PaaS tenant isolation, by managing the attack surface exposed by useβ¦β77Dec 14, 2022Updated 3 years ago
- Threat matrix for CI/CD Pipelineβ759Jul 8, 2024Updated last year
- CloudSplaining on AWS Managed Policiesβ44Sep 8, 2025Updated 6 months ago
- Prevent SSRF attacks on AWS EC2 via automated upgrades to the more secure Instance Metadata Service v2 (IMDSv2).β144May 1, 2025Updated 10 months ago
- DigitalOcean Gradient AI Platform β’ AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Salesforce Policy Deviation Checkerβ30Sep 30, 2020Updated 5 years ago
- Minimum Viable Secure Product mvsp.devβ204Dec 17, 2024Updated last year
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accountsβ61May 15, 2023Updated 2 years ago
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.β181Dec 11, 2025Updated 3 months ago
- β22Jan 6, 2022Updated 4 years ago
- A Continuous Threat Modeling methodologyβ324Jun 24, 2022Updated 3 years ago
- The Security Champion Framework provides both a measuring stick and a roadmap generator for Champion Programs.β110Jan 16, 2024Updated 2 years ago
- Home of code related to security of network systems.β25Jan 22, 2025Updated last year
- A Pythonic framework for threat modelingβ1,113Mar 16, 2026Updated last week
- Managed Kubernetes at scale on DigitalOcean β’ AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- We borrow the concept of 'personas' from UX/service design and apply it to threat actors to improve understanding between security, technβ¦β11Jun 17, 2020Updated 5 years ago
- Semgrep-based Policy Controller for Kubernetesβ47Apr 4, 2025Updated 11 months ago
- Microsoft Excel spreadsheets for consistent security evaluation of Android and iOS mobile applicationsβ50Sep 23, 2015Updated 10 years ago
- Autonomous AI C2β33Jul 23, 2024Updated last year
- This repository stores content that can be used to design a Rapid Threat Model Prototyping process for a software development group.β165Mar 14, 2023Updated 3 years ago
- Unsafe Unpacking Vulnerability: Lab Code, Semgrep Rules and Secure Implementation Guideβ43Dec 16, 2024Updated last year
- Volatile Artifact Collector collects a snapshot of volatile data from a system. It tells you what is happening on a system, and is of parβ¦β254Nov 18, 2024Updated last year