ποΈ equivalence table between OWASP ASVS standard and STRIDE threat modeling methodology.
β76Aug 22, 2024Updated last year
Alternatives and similar repositories for STRIDE-vs-ASVS
Users that are interested in STRIDE-vs-ASVS are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Provide some tips to handle Injection into application code (OWASP TOP 10 - A1).β10Nov 11, 2020Updated 5 years ago
- Assess certain AWS network configurationsβ12Aug 22, 2018Updated 7 years ago
- HashiCorp-relevant rules for the Semgrep code analysis toolβ41Oct 3, 2023Updated 2 years ago
- Simple tool to identify and remediate the use of the AWS EC2 IMDSv1.β15Aug 12, 2021Updated 4 years ago
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrixβ59Sep 7, 2023Updated 2 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI β’ AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. β¦β72Jun 25, 2025Updated 10 months ago
- β125Nov 8, 2023Updated 2 years ago
- Semgrep rules corresponding to the OWASP ASVS standardβ27Nov 2, 2020Updated 5 years ago
- A colour-coded radar chart to keep track of technologies in use, whether they are being evaluated, adopted or phased out.β14Apr 20, 2026Updated 2 weeks ago
- β20Jan 18, 2022Updated 4 years ago
- A meta-database collecting resources that compile lists of breachesβ22Oct 30, 2025Updated 6 months ago
- Proof of concept code for Datadog Security Labs referenced exploits.β448Updated this week
- OWASP Foundation web repositoryβ64Apr 7, 2026Updated last month
- Slack bot which promotes Defense in Depth/Zero Trust security practicesβ25Jan 17, 2023Updated 3 years ago
- Simple, predictable pricing with DigitalOcean hosting β’ AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Useful scripts, Docker images, docker-compose apps, and Terraform modules.β149Apr 15, 2026Updated 3 weeks ago
- Segment's Threat Modeling training for our engineersβ246May 4, 2021Updated 5 years ago
- Compares and analyzes GCP IAM roles.β79Mar 9, 2025Updated last year
- Gram is Klarna's own threat model diagramming toolβ334Apr 23, 2026Updated 2 weeks ago
- β36Mar 8, 2022Updated 4 years ago
- Agile Threat Modeling Toolkitβ760Apr 8, 2026Updated 3 weeks ago
- Threat matrix for CI/CD Pipelineβ764Jul 8, 2024Updated last year
- PEACH - a step-by-step framework for modeling and improving SaaS and PaaS tenant isolation, by managing the attack surface exposed by useβ¦β79Dec 14, 2022Updated 3 years ago
- CloudSplaining on AWS Managed Policiesβ44Sep 8, 2025Updated 7 months ago
- Managed Database hosting by DigitalOcean β’ AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Prevent SSRF attacks on AWS EC2 via automated upgrades to the more secure Instance Metadata Service v2 (IMDSv2).β144May 1, 2025Updated last year
- Salesforce Policy Deviation Checkerβ30Sep 30, 2020Updated 5 years ago
- Minimum Viable Secure Product mvsp.devβ204Dec 17, 2024Updated last year
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accountsβ61May 15, 2023Updated 2 years ago
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.β181Dec 11, 2025Updated 4 months ago
- β22Jan 6, 2022Updated 4 years ago
- The Security Champion Framework provides both a measuring stick and a roadmap generator for Champion Programs.β110Jan 16, 2024Updated 2 years ago
- A Continuous Threat Modeling methodologyβ327Jun 24, 2022Updated 3 years ago
- Home of code related to security of network systems.β25Jan 22, 2025Updated last year
- Managed hosting for WordPress and PHP on Cloudways β’ AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A Pythonic framework for threat modelingβ1,125Updated this week
- We borrow the concept of 'personas' from UX/service design and apply it to threat actors to improve understanding between security, technβ¦β11Jun 17, 2020Updated 5 years ago
- Semgrep-based Policy Controller for Kubernetesβ47Apr 4, 2025Updated last year
- Microsoft Excel spreadsheets for consistent security evaluation of Android and iOS mobile applicationsβ50Sep 23, 2015Updated 10 years ago
- Autonomous AI C2β32Jul 23, 2024Updated last year
- This repository stores content that can be used to design a Rapid Threat Model Prototyping process for a software development group.β165Mar 14, 2023Updated 3 years ago
- Unsafe Unpacking Vulnerability: Lab Code, Semgrep Rules and Secure Implementation Guideβ43Dec 16, 2024Updated last year