Core model including reused documentation
☆102Dec 16, 2025Updated 3 months ago
Alternatives and similar repositories for core
Users that are interested in core are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- SAMMY Open Source v2☆14Feb 6, 2025Updated last year
- Open SAMMY codebase☆24Mar 10, 2026Updated last week
- The OWASP SAMM Website☆11Mar 7, 2026Updated 2 weeks ago
- Node application to help managing Maturity Models like the ones created by BSIMM and OpenSAMM☆195Aug 27, 2018Updated 7 years ago
- NextJS-based single-page application for completing and reviewing SAMM assessments☆79Mar 20, 2023Updated 3 years ago
- ☆14Dec 3, 2022Updated 3 years ago
- SAMM stands for Software Assurance Maturity Model.☆397May 17, 2022Updated 3 years ago
- OWASP Foundation Web Respository☆28Dec 22, 2025Updated 3 months ago
- ☆35Mar 8, 2022Updated 4 years ago
- OWASP Foundation Web Respository☆22Feb 27, 2026Updated 3 weeks ago
- Elevation of MLsec: a threat-modeling card game for machine learning systems☆33Nov 24, 2025Updated 3 months ago
- OWASP Kubernetes Security Testing Guide☆42Dec 22, 2025Updated 3 months ago
- ☆22Mar 24, 2025Updated last year
- Using AutoMapper with EntityFramework Core and PostgreSql on Asp.Net Core☆10Jun 15, 2025Updated 9 months ago
- ☆569Updated this week
- The AI Security Verification Standard (AISVS) focuses on providing developers, architects, and security professionals with a structured c…☆88Updated this week
- The command-line client for Journal☆12Oct 26, 2024Updated last year
- OWASP IoT Security Verification Standard (ISVS)☆149Oct 6, 2025Updated 5 months ago
- Threat Modeling Manifesto☆30Jul 18, 2024Updated last year
- OWASP Foundation Web Respository☆32Oct 11, 2025Updated 5 months ago
- Dragon-GPT uses Chat-GPT, or local LLM, to execute automatic and AI-powered threat modeling analysis on a given OWASP Threat Dragon diagr…☆41Jun 20, 2025Updated 9 months ago
- ☆147Mar 16, 2026Updated last week
- DARPA CASE program☆16Jun 10, 2025Updated 9 months ago
- A Pythonic framework for threat modeling☆1,113Mar 16, 2026Updated last week
- Presentation Slides and Resources☆16Jun 12, 2024Updated last year
- Draw.io libraries for threat modeling diagrams☆788Nov 12, 2020Updated 5 years ago
- A structured red-team prompt for generating ethical hacking tools using AI - designed for use in labs, CTFs, and authorized security asse…☆25Jun 26, 2025Updated 8 months ago
- An example repo demonstrating keyless signing with Github Actions☆11May 24, 2022Updated 3 years ago
- pcaps for Wireshark tutorial about examining Dridex infection traffic☆17Oct 8, 2020Updated 5 years ago
- This provides a guided step by step walkthrough for threat modeling with MITRE ATT&CK Framework☆30Jan 7, 2026Updated 2 months ago
- Generate xBOMs enriched with AI, SaaS, Crypto and more using Static Code Analysis☆28Jan 22, 2026Updated 2 months ago
- List of Red Team Resources☆17Jun 16, 2020Updated 5 years ago
- A comprehensive framework and assessment toolkit for measuring and improving Cloud Native security maturity across 8 critical business fu…☆10Jun 24, 2025Updated 8 months ago
- This repository collects proposals to enhance Schematron beyond the ISO specification☆10Feb 8, 2022Updated 4 years ago
- This repository will teach you got to present my talk "Security is everybody's job", a talk about DevSecOps.☆27Sep 20, 2022Updated 3 years ago
- OWASP Foundation Web Respository☆44Oct 8, 2025Updated 5 months ago
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆69Jun 25, 2025Updated 8 months ago
- ZAP Management Scripts☆23Mar 1, 2026Updated 3 weeks ago
- OWASP Foundation Web Respository☆17Jun 1, 2022Updated 3 years ago