semgrep-old / rules-owasp-asvs
Semgrep rules corresponding to the OWASP ASVS standard
β27Updated 4 years ago
Alternatives and similar repositories for rules-owasp-asvs:
Users that are interested in rules-owasp-asvs are comparing it to the libraries listed below
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagramsβ102Updated last month
- ποΈ STRIDE vs. ASVS equivalence tableβ76Updated 7 months ago
- β63Updated 2 years ago
- A small tool to help developers understand a huge set of security requirements from appsec teamsβ45Updated 2 years ago
- β32Updated 4 years ago
- Orchestron is an Application Vulnerability Management and Correlation Tool.Orchestron helps you solve one key problem "Find and fix vulneβ¦β31Updated 2 years ago
- Docs: Vulnerability management aggregation of AppSec & OpSec (Tools Listing)β30Updated last year
- Presentations, training modules, and other education materials from Duo Security's Application Security team.β73Updated 3 years ago
- Manager of third-party sources of Semgrep rules πβ81Updated 8 months ago
- Reference architecture and proof of concept implementation for supply chain security gatewayβ23Updated last year
- β110Updated last year
- The Open Security Summit is focused on the collaboration between, Developers and Application Securityβ45Updated 3 months ago
- OWASP Foundation Web Respositoryβ34Updated 6 months ago
- β123Updated last year
- The Security Champion Framework provides both a measuring stick and a roadmap generator for Champion Programs.β107Updated last year
- GCP GOAT is the vulnerable application for learn the GCP Securityβ64Updated last year
- MetaSec.js combines all the free open-source security tools to identify issues with JavaScript and automates the boring partsβ80Updated 2 years ago
- InfoSec OpenAI Examplesβ19Updated last year
- An experimental project using LLM technology to generate security documentation for Open Source Software (OSS) projectsβ26Updated 3 weeks ago
- A step-by-step walkthrough of CloudGoat 2.0 scenarios.β134Updated 4 years ago
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. β¦β61Updated 9 months ago
- AI featured threat modeling and security review actionβ43Updated 4 months ago
- An extension to use Semgrep inside Burp Suite.β88Updated last year
- Protect against subdomain takeoverβ93Updated 10 months ago
- Jekyll Files for cloudsecwiki.comβ50Updated 3 years ago
- β90Updated 3 years ago
- Maturity Model Collaborative projectβ14Updated 2 years ago
- CircleCI log and security configuration automationsβ22Updated 4 years ago
- A zero-dependency tool for finding secrets in directoriesβ10Updated 4 years ago
- AWS Security Checksβ37Updated 7 years ago