Hi all!
I started making an ASVS "testing guide" of level 1 controls (penetration testable ones from blackbox perspective). I documented 4/5ish sections, which you can check out here:
The guide describes what each L1 control exactly tests, what could it mean if the control is failed, how to test it (usually I provide a short guide to some known open source tools) and the criteria for the control to be valid. The aim of this project is to make it easier to get started with using OWASP ASVS and have a place to refer to when in doubt how to test a control.
To around 25ish controls I wrote scripts using ZAP scripting engine or just in bash, that would check if the control is valid. I used ZAP becauseI can use a spider on a website gives me better coverage of a web app and in fact I have found areas that were not secured or misconfigured, which I haven't seen before.