Dark Mode

Settings

Methodologies

This is a list of well-known methodologies used in the cybersecurity field to perform security assessments.

Methodologies Table

Methodology ID Name Asset Type Description Link

1

OWASP Firmware Security Testing Methodology SystemLayer.Firmware FSTM is composed of nine stages tailored to enable security researchers, software developers, hobbyists, and Information Security professionals with conducting firmware security assessments. https://github.com/scriptingxss/owasp-fstm

2

OWASP Web Security Testing Methodology Service.Web The WSTG is a comprehensive guide to testing the security of web applications and web services. https://github.com/OWASP/wstg
Methodology ID Name Asset Type Description Link