Core model including reused documentation
☆101Dec 16, 2025Updated 2 months ago
Alternatives and similar repositories for core
Users that are interested in core are comparing it to the libraries listed below
Sorting:
- NextJS-based single-page application for completing and reviewing SAMM assessments☆79Mar 20, 2023Updated 2 years ago
- The OWASP SAMM Website☆11Updated this week
- ☆14Dec 3, 2022Updated 3 years ago
- Toolbox spreadsheet for assessing maturity and definition of roadmap☆16Sep 18, 2024Updated last year
- SAMMY Open Source v2☆14Feb 6, 2025Updated last year
- Node application to help managing Maturity Models like the ones created by BSIMM and OpenSAMM☆195Aug 27, 2018Updated 7 years ago
- SAMM stands for Software Assurance Maturity Model.☆398May 17, 2022Updated 3 years ago
- Elevation of MLsec: a threat-modeling card game for machine learning systems☆31Nov 24, 2025Updated 3 months ago
- ☆563Updated this week
- Threat Modeling Manifesto☆30Jul 18, 2024Updated last year
- The command-line client for Journal☆12Oct 26, 2024Updated last year
- OWASP Foundation Web Respository☆28Dec 22, 2025Updated 2 months ago
- OWASP Foundation Web Respository☆32Oct 11, 2025Updated 4 months ago
- A collection of permissively licensed Semgrep rules.☆22Jul 5, 2024Updated last year
- ☆56Feb 19, 2026Updated last week
- Source for official CVE Program policy documents.☆18Jan 28, 2026Updated last month
- Open SAMMY codebase☆24Feb 24, 2026Updated last week
- Raf Scanner IDE☆12Apr 14, 2023Updated 2 years ago
- Application Security Verification Standard☆3,350Updated this week
- THOR APT Scanner User Manual☆20Jan 30, 2026Updated last month
- Educational repository with source code examples☆12Jun 3, 2025Updated 9 months ago
- DARPA CASE program☆15Jun 10, 2025Updated 8 months ago
- Presentation Slides and Resources☆16Jun 12, 2024Updated last year
- A tool for detecting sensitive data in code repositories☆18Updated this week
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆68Jun 25, 2025Updated 8 months ago
- Carving tool based in Radare2 & Yara☆17Oct 30, 2018Updated 7 years ago
- Database interaction layer to store the Open Asset Model in a database management system☆21Feb 20, 2026Updated last week
- ☆37Feb 25, 2025Updated last year
- OWASP IoT Security Verification Standard (ISVS)☆148Oct 6, 2025Updated 4 months ago
- CLI tool for interacting with GPT, analyze local files, etc.☆15May 18, 2025Updated 9 months ago
- Advanced Cluster Security for Kubernetes tutorial☆14Apr 22, 2024Updated last year
- An MCP Server for Pwndoc (Pentesting Reporting Tool)☆39Jan 23, 2026Updated last month
- Scapytain is a web application that enables you to store, organise and run test campaigns on top of Scapy.☆19Jun 19, 2018Updated 7 years ago
- all published scripts devloped by ahmed khlief☆20Apr 3, 2020Updated 5 years ago
- Collected resources for OSWA preparation.☆26Jan 25, 2023Updated 3 years ago
- OWASP Foundation Web Respository☆17Jun 1, 2022Updated 3 years ago
- Automate All Pivoting System Enumeration with this Bash Script☆13Nov 7, 2022Updated 3 years ago
- A community collection of security reviews of open source software components.☆97Feb 29, 2024Updated 2 years ago
- ☆141Feb 24, 2026Updated last week