owaspsamm / sammwiseLinks
NextJS-based single-page application for completing and reviewing SAMM assessments
☆78Updated 2 years ago
Alternatives and similar repositories for sammwise
Users that are interested in sammwise are comparing it to the libraries listed below
Sorting:
- Core model including reused documentation☆100Updated 2 weeks ago
- The Security Champion Framework provides both a measuring stick and a roadmap generator for Champion Programs.☆110Updated last year
- ☆124Updated 2 years ago
- A Continuous Threat Modeling methodology☆324Updated 3 years ago
- Security Champions Playbook v 2.1☆384Updated 2 years ago
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆177Updated 2 weeks ago
- threatspec - continuous threat modeling, through code☆371Updated 5 years ago
- An extensive list of resources related to threat modelling. Gotta catch ’em all!☆40Updated 3 weeks ago
- ☆87Updated 4 years ago
- Software Component Verification Standard (SCVS)☆152Updated 8 months ago
- StartLeft is an automation tool for generating Threat Models written in the Open Threat Model (OTM) format from a variety of different so…☆52Updated last month
- A small tool to help developers understand a huge set of security requirements from appsec teams☆47Updated 3 years ago
- ☆131Updated 2 weeks ago
- OWASP Foundation Web Respository☆22Updated 2 months ago
- ☆552Updated 2 weeks ago
- OWASP Foundation web repository☆33Updated this week
- Segment's Threat Modeling training for our engineers☆244Updated 4 years ago
- ☆113Updated last year
- This repository stores content that can be used to design a Rapid Threat Model Prototyping process for a software development group.☆163Updated 2 years ago
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆68Updated 6 months ago
- This project is about creating and publishing threat model examples.☆428Updated 4 years ago
- boostsecurityio/poutine☆351Updated last month
- A utility to (re-)import findings and language data into DefectDojo☆43Updated last year
- ☆35Updated 5 years ago
- The OWASP DevSecOps Guideline explains how we can implement a secure pipeline and use best practices and introduce tools that we can use …☆78Updated last week
- ☆194Updated 2 years ago
- AI featured threat modeling and security review action☆45Updated last year
- OWASP Foundation Threat Dragon Project Web Repository☆86Updated last week
- Host and manage multiple Juice Shop instances for security trainings and Capture The Flags☆303Updated this week
- OWASP Foundation Web Respository☆28Updated last week