☆69Jul 18, 2025Updated 7 months ago
Alternatives and similar repositories for materialize-threats
Users that are interested in materialize-threats are comparing it to the libraries listed below
Sorting:
- A unified DevSecOps Framework that allows you to go from iterative, collaborative Threat Modeling to Application Security Test Orchestrat…☆280Feb 17, 2026Updated 2 weeks ago
- Equal Experts Secure Delivery Playbook☆26Feb 21, 2023Updated 3 years ago
- This repository stores content that can be used to design a Rapid Threat Model Prototyping process for a software development group.☆165Mar 14, 2023Updated 2 years ago
- EZGHSA is a command-line tool for summarizing and filtering vulnerability alerts on Github repositories.☆35Jan 4, 2026Updated 2 months ago
- Kantega Web Application Security Hero Challenge☆19Dec 3, 2020Updated 5 years ago
- goSDL☆522Nov 3, 2025Updated 4 months ago
- Segment's Threat Modeling training for our engineers☆245May 4, 2021Updated 4 years ago
- Spotter is a comprehensive Kubernetes security scanner that uses CEL-based rules to identify security vulnerabilities, misconfigurations,…☆71Sep 13, 2025Updated 5 months ago
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagrams☆107Jan 30, 2025Updated last year
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Jan 18, 2022Updated 4 years ago
- ☆35May 13, 2021Updated 4 years ago
- A tool to investigate Dependency Confusion in Artifactory☆24May 15, 2025Updated 9 months ago
- Threat Mitigation Strategies☆28Feb 18, 2026Updated 2 weeks ago
- AppSecPipeline Specification for DevOps automation.☆40Dec 8, 2022Updated 3 years ago
- DEPRECATED - web security checklist for Firefox Services☆78Jan 6, 2021Updated 5 years ago
- A comprehensive checklist and guide for organizations looking to implement a robust cybersecurity program☆46Feb 2, 2026Updated last month
- ☆124Nov 8, 2023Updated 2 years ago
- A Continuous Threat Modeling methodology☆324Jun 24, 2022Updated 3 years ago
- ☆75Feb 11, 2026Updated 3 weeks ago
- Using Microsoft 365 App Passwords for persistence☆23Sep 2, 2020Updated 5 years ago
- Proof-of-Concept exploits for CVE-2017-11882☆41Jan 2, 2018Updated 8 years ago
- A set of vulnerable Golang programs☆179Jul 5, 2023Updated 2 years ago
- The SOCless automation framework☆140Feb 11, 2025Updated last year
- Demos for several kubernetes security features☆64Jan 9, 2025Updated last year
- Assess certain AWS network configurations☆12Aug 22, 2018Updated 7 years ago
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raider☆139Sep 14, 2021Updated 4 years ago
- OWASP Foundation Web Respository☆28Dec 5, 2025Updated 2 months ago
- Demonstrates how a malicious dependency could negatively impact the build output.☆25Aug 11, 2023Updated 2 years ago
- Node application to help managing Maturity Models like the ones created by BSIMM and OpenSAMM☆195Aug 27, 2018Updated 7 years ago
- Materials used by Product Management and Product Marketing☆12Aug 5, 2018Updated 7 years ago
- -notes and scripts for online course OffIOT☆12Jan 19, 2026Updated last month
- Jekyll Files for cloudsecwiki.com☆49Sep 16, 2021Updated 4 years ago
- Tools to measure the maturity of Enterprise Security Architecture processes☆13Sep 22, 2017Updated 8 years ago
- Embedded AppSec Best Practices☆45Oct 22, 2025Updated 4 months ago
- Snyk Node Runtime Agent☆16Apr 12, 2022Updated 3 years ago
- Varna: Quick & Cheap AWS CloudTrail Monitoring with Event Query Language (EQL)☆52Dec 26, 2022Updated 3 years ago
- Tree traversal and transform functions☆12Jun 7, 2015Updated 10 years ago
- 🖇️ equivalence table between OWASP ASVS standard and STRIDE threat modeling methodology.☆76Aug 22, 2024Updated last year
- threatspec - continuous threat modeling, through code☆379Dec 30, 2020Updated 5 years ago