Threat Modelling Assets (STRIDE, DREAD, etc. cheat sheets)
☆13Apr 16, 2020Updated 5 years ago
Alternatives and similar repositories for threat-modelling
Users that are interested in threat-modelling are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A curated threat modeling library collection☆24Dec 1, 2023Updated 2 years ago
- ShiftLeft Scan is a free and open-source commercial-grade security tool for modern DevOps teams.☆13Dec 30, 2022Updated 3 years ago
- The Quick theme magically transforms your README.md into a GitHub Pages site, applying clean and visually appealing styles. The fastest a…☆22Nov 30, 2025Updated 3 months ago
- Meraki Dashboard API scripts in Python☆12Sep 26, 2023Updated 2 years ago
- Data Structures & Algorithms Using C#☆17Dec 30, 2023Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- RESTful API made with Fiber☆10Mar 6, 2020Updated 6 years ago
- pysap SAPMS+SAPRFC patches for Gateway / MS research☆11Apr 30, 2019Updated 6 years ago
- ☆10Aug 8, 2015Updated 10 years ago
- Software Modules and Examples for the PiFex☆14Aug 23, 2025Updated 7 months ago
- This is the updated and error free driver for TP-link wn772n v2/3 wifi adapter.☆19Nov 6, 2022Updated 3 years ago
- Qakbot Registry Key Configuration Decryptor☆14Dec 20, 2021Updated 4 years ago
- Raspberry Pi Pure Python Library for the HDC1000 / HDC1080 Temperature and Humidity Sensor - Breakout board at store.SwitchDoc.com☆15Jun 27, 2017Updated 8 years ago
- Universal Radio Hacker: investigate wireless protocols like a boss 📡😎☆11Dec 5, 2019Updated 6 years ago
- ☆13May 12, 2019Updated 6 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A security assessment tool for Hitachi Vantara's Pentaho Business Analytics platform.☆13Oct 31, 2021Updated 4 years ago
- A simple SHELL written in HTML and PHP can be used for performing RFI(Remote File Inclusion) & LFI(Local File Inclusion).☆18Aug 27, 2017Updated 8 years ago
- A Splunk app that will rotate between dashboards on a frequency; useful for displaying content on informational big screens.☆13Mar 9, 2022Updated 4 years ago
- MF Signaling in Asterisk!☆12Jul 2, 2021Updated 4 years ago
- Collections of tools and methods created to aid in OSINT collection☆24Sep 17, 2022Updated 3 years ago
- Remote Linux Loadable Kernel Module (LKM) rootkit (For Linux Kernels 5.x). Shell command execution by ping.☆22Jul 24, 2022Updated 3 years ago
- Python library to control the Elgato Stream Deck.☆16Dec 13, 2022Updated 3 years ago
- Subdomain finder☆10Mar 13, 2025Updated last year
- ☆11Mar 2, 2023Updated 3 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- 👨🏼🏫 CTF education guide (In Russian). Курс молодого бойца CTF☆10Nov 11, 2018Updated 7 years ago
- Two-Axis Az/El rotor using portable satellite antenna☆20Jan 25, 2025Updated last year
- ☆22Apr 11, 2025Updated 11 months ago
- A simple ReST server to lookup threat actors (by name, synonym or UUID) and returning the corresponding MISP galaxy information about the…☆50Aug 30, 2025Updated 6 months ago
- Ultimate Container Security Track☆12Nov 9, 2023Updated 2 years ago
- Releases of panda code.☆18Jan 22, 2025Updated last year
- ☆28May 14, 2020Updated 5 years ago
- ATTiny84 V-USB Business card☆17Oct 26, 2018Updated 7 years ago
- A repository with various tutorials on how to do things in Pentesting, setup environments and other things☆20Apr 26, 2025Updated 11 months ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Web Browser control using hand gestures☆32Jun 23, 2018Updated 7 years ago
- Bmw IBUS daemon☆27Nov 11, 2012Updated 13 years ago
- Build your own cloud virtual machine lab☆13Nov 25, 2025Updated 4 months ago
- Exploring Kubernetes Beyond the Certification Topics☆14Jan 22, 2021Updated 5 years ago
- This provides a guided step by step walkthrough for threat modeling with MITRE ATT&CK Framework☆30Jan 7, 2026Updated 2 months ago
- Legacy Fairwaves XTRX API library☆28Feb 3, 2023Updated 3 years ago
- Node.js solver and deobfuscator for Vercel Attack Mode with an attached detailed article.☆27Mar 3, 2024Updated 2 years ago