Core model including reused documentation
☆103Dec 16, 2025Updated 3 months ago
Alternatives and similar repositories for core
Users that are interested in core are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Open SAMMY codebase☆24Mar 24, 2026Updated 2 weeks ago
- The OWASP SAMM Website☆11Mar 25, 2026Updated 2 weeks ago
- Node application to help managing Maturity Models like the ones created by BSIMM and OpenSAMM☆195Aug 27, 2018Updated 7 years ago
- Toolbox spreadsheet for assessing maturity and definition of roadmap☆16Sep 18, 2024Updated last year
- NextJS-based single-page application for completing and reviewing SAMM assessments☆79Mar 20, 2023Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆14Dec 3, 2022Updated 3 years ago
- SAMM stands for Software Assurance Maturity Model.☆397May 17, 2022Updated 3 years ago
- ☆36Mar 8, 2022Updated 4 years ago
- Elevation of MLsec: a threat-modeling card game for machine learning systems☆33Nov 24, 2025Updated 4 months ago
- A MAL language that demonstrates the Maven project structure☆23Feb 27, 2026Updated last month
- This is the GitHub repo of the OpenChain SBOM Study Group☆12Feb 18, 2026Updated last month
- OWASP Foundation web repository☆45Mar 9, 2026Updated last month
- ☆13Feb 11, 2022Updated 4 years ago
- OWASP Kubernetes Security Testing Guide☆42Dec 22, 2025Updated 3 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆22Mar 24, 2025Updated last year
- Using AutoMapper with EntityFramework Core and PostgreSql on Asp.Net Core☆10Jun 15, 2025Updated 9 months ago
- ☆571Updated this week
- The command-line client for Journal☆12Oct 26, 2024Updated last year
- Application Security Verification Standard☆3,387Mar 17, 2026Updated 3 weeks ago
- OWASP IoT Security Verification Standard (ISVS)☆149Oct 6, 2025Updated 6 months ago
- Threat Modeling Manifesto☆30Jul 18, 2024Updated last year
- OWASP Foundation Web Respository☆32Oct 11, 2025Updated 6 months ago
- OWASP Foundation web repository☆22Mar 30, 2026Updated 2 weeks ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Dragon-GPT uses Chat-GPT, or local LLM, to execute automatic and AI-powered threat modeling analysis on a given OWASP Threat Dragon diagr…☆41Jun 20, 2025Updated 9 months ago
- ☆150Mar 27, 2026Updated 2 weeks ago
- The AI Security Verification Standard (AISVS) focuses on providing developers, architects, and security professionals with a structured c…☆112Updated this week
- DARPA CASE program☆16Jun 10, 2025Updated 10 months ago
- ☆37Feb 25, 2025Updated last year
- Wireshark dissector for Broadcom specific H4 diagnostic commands☆25Jan 6, 2023Updated 3 years ago
- A Pythonic framework for threat modeling☆1,119Mar 16, 2026Updated 3 weeks ago
- Custom queries list for BloodHound☆32Jul 8, 2025Updated 9 months ago
- ☆13Apr 28, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Presentation Slides and Resources☆16Jun 12, 2024Updated last year
- Draw.io libraries for threat modeling diagrams☆788Nov 12, 2020Updated 5 years ago
- An extension to use Semgrep inside Burp Suite.☆88May 23, 2025Updated 10 months ago
- A structured red-team prompt for generating ethical hacking tools using AI - designed for use in labs, CTFs, and authorized security asse…☆25Jun 26, 2025Updated 9 months ago
- An example repo demonstrating keyless signing with Github Actions☆11May 24, 2022Updated 3 years ago
- pcaps for Wireshark tutorial about examining Dridex infection traffic☆17Oct 8, 2020Updated 5 years ago
- This provides a guided step by step walkthrough for threat modeling with MITRE ATT&CK Framework☆30Jan 7, 2026Updated 3 months ago