owaspsamm / websiteLinks
The OWASP SAMM Website
☆11Updated last week
Alternatives and similar repositories for website
Users that are interested in website are comparing it to the libraries listed below
Sorting:
- DefectDojo Community Content☆18Updated last month
- OWASP Foundation Web Respository☆10Updated 2 years ago
- Defending IaaS with ATT&CK is a project to create a collection of ATT&CK techniques relevant to a Linux IaaS environment, as well as a me…☆14Updated last month
- GitHub action to run Threagile, the agile threat modeling toolkit, on a repo's threagile.yaml file☆13Updated last year
- A collection of dashboards, templates, API's and Power BI code for vulnerability management and analysis☆23Updated 5 months ago
- The Clouditor is a tool to support continuous cloud assurance. Developed by Fraunhofer AISEC.☆78Updated last week
- Threat Modeling (based on STRIDE approach) for Kubernetes systems.☆25Updated 9 months ago
- ☆16Updated 3 years ago
- Global Security Database Tools☆43Updated last year
- ☆12Updated 3 weeks ago
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆19Updated 2 years ago
- FedRAMP Requests For Comments (RFCs)☆18Updated 3 weeks ago
- PEACH - a step-by-step framework for modeling and improving SaaS and PaaS tenant isolation, by managing the attack surface exposed by use…☆71Updated 2 years ago
- A Golang library for interacting with the EPSS (Exploit Prediction Scoring System).☆29Updated 5 months ago
- ☆12Updated 3 months ago
- ☆73Updated 3 months ago
- This project can be used to create AMIs based on Kali Linux, a penetration testing distribution.☆21Updated last week
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆71Updated last year
- OWASP Foundation Web Respository☆28Updated 10 months ago
- A project to visualize the software supply chain☆51Updated last year
- ☆54Updated last week
- ☆30Updated 3 weeks ago
- Microsoft Defender for Cloud threat matrix for Kubernetes☆25Updated 2 years ago
- Protect your Cloud Native Applications running on Kubernetes from malicious attacks with pre-registered source code, pre-registered runti…☆56Updated 7 months ago
- ☆41Updated 4 months ago
- ATHI — An AI Threat Modeling Framework for Policymakers☆52Updated last year
- NIST 800-53 Baseline Configuration Tool☆13Updated 10 months ago
- Automated process to build and distribute Posture & Exposure Reports' bi-weekly to customers.☆17Updated last year
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆65Updated 3 weeks ago
- AI/ML applications have unique security threats. Project GuardRail is a set of security and privacy requirements that AI/ML applications …☆29Updated 6 months ago