veracode / veracode-postmanLinks
Use Veracode APIs from Postman
☆18Updated last year
Alternatives and similar repositories for veracode-postman
Users that are interested in veracode-postman are comparing it to the libraries listed below
Sorting:
- Agile Threat Modeling Toolkit☆722Updated 2 months ago
- The Security Champion Framework provides both a measuring stick and a roadmap generator for Champion Programs.☆110Updated 2 years ago
- ☆559Updated this week
- A Continuous Threat Modeling methodology☆324Updated 3 years ago
- A Pythonic framework for threat modeling☆1,100Updated 3 weeks ago
- This project is about creating and publishing threat model examples.☆427Updated 4 years ago
- Security Champions Playbook v 2.1☆389Updated 2 years ago
- Segment's Threat Modeling training for our engineers☆245Updated 4 years ago
- Draw.io libraries for threat modeling diagrams☆785Updated 5 years ago
- Incubating project for decoupling responsibilities from Dependency-Track's monolithic API server into separate, scalable services.☆95Updated this week
- secureCodeBox (SCB) - continuous secure delivery out of the box☆955Updated last week
- Fork of the Dependency-Track API server. It includes various changes necessary to work with Hyades.☆19Updated this week
- ☆88Updated 4 years ago
- ☆89Updated 4 months ago
- ☆114Updated last year
- Scans Software Bill of Materials (SBOMs) for security vulnerabilities☆597Updated 10 months ago
- An AI-powered threat modeling tool that leverages OpenAI's GPT models to generate threat models for a given application based on the STRI…☆975Updated last month
- Software Component Verification Standard (SCVS)☆153Updated 10 months ago
- OWASP Foundation Web Respository☆22Updated 3 months ago
- threatspec - continuous threat modeling, through code☆377Updated 5 years ago
- Frontend UI for Dependency-Track☆150Updated this week
- OWASP ASVS checklist for audits☆212Updated 2 years ago
- CycloneDX SBOM Model and Utils for Creating and Validating BOMs☆105Updated this week
- OWASP Foundation web repository☆34Updated last week
- An extensive list of resources related to threat modelling. Gotta catch ’em all!☆40Updated this week
- Streamline vulnerability patching with CVSS, EPSS, and CISA's Known Exploited Vulnerabilities. Prioritize actions based on real-time thre…☆683Updated last month
- NextJS-based single-page application for completing and reviewing SAMM assessments☆79Updated 2 years ago
- An open source threat modeling tool from OWASP☆1,310Updated this week
- materials we hand out☆147Updated 6 months ago
- Vulnerable app with examples showing how to not use secrets☆1,395Updated this week