☆115Jul 3, 2024Updated last year
Alternatives and similar repositories for security-belts
Users that are interested in security-belts are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆573Updated this week
- German translation of the Microsoft Elevation of Privilege card game along with notes and examples☆10Jan 9, 2016Updated 10 years ago
- threatspec - continuous threat modeling, through code☆382Dec 30, 2020Updated 5 years ago
- Pin designs for security related items☆37Feb 16, 2026Updated 2 months ago
- A gitleaks config that has most of Microsoft's deprecated credscan rules ported to it.☆13Apr 3, 2022Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Security Champions Playbook v 2.1☆392Sep 25, 2023Updated 2 years ago
- This repository stores content that can be used to design a Rapid Threat Model Prototyping process for a software development group.☆165Mar 14, 2023Updated 3 years ago
- EZGHSA is a command-line tool for summarizing and filtering vulnerability alerts on Github repositories.☆36Jan 4, 2026Updated 3 months ago
- StartLeft is an automation tool for generating Threat Models written in the Open Threat Model (OTM) format from a variety of different so…☆54Mar 4, 2026Updated last month
- A Continuous Threat Modeling methodology☆327Jun 24, 2022Updated 3 years ago
- HaveIBeenPwned Password Policy for Keycloak PoC☆12Jan 22, 2019Updated 7 years ago
- A documentation and tracking project with the goal of making package management systems more secure.☆51Mar 5, 2021Updated 5 years ago
- Gordon is status check Github app to enforce and validate about.yaml file specifications in a repository during pull requests to drive co…☆20Feb 4, 2025Updated last year
- Active Response plugin. Osquery to execute wazuh/ossec active response plugins. You can write your own plugins, easy to plug☆12Jun 20, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Maturity Model Collaborative project☆15Feb 27, 2023Updated 3 years ago
- Serverless Workshop☆16Dec 8, 2022Updated 3 years ago
- ☆18Apr 21, 2020Updated 5 years ago
- Templates for the Microsoft Threat Modeling Tool☆178Aug 4, 2025Updated 8 months ago
- All-in-one tool for managing vulnerability reports from AppSec pipelines☆108Jan 11, 2023Updated 3 years ago
- Discover vulnerabilities and container image misconfiguration in production environments.☆55Apr 8, 2026Updated last week
- ☆36Mar 8, 2022Updated 4 years ago
- ☆63Jun 3, 2025Updated 10 months ago
- Repo to hold mapping of user-security-stories☆120Nov 28, 2018Updated 7 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Dragon-GPT uses Chat-GPT, or local LLM, to execute automatic and AI-powered threat modeling analysis on a given OWASP Threat Dragon diagr…☆42Jun 20, 2025Updated 9 months ago
- Time limited, auto-expiring group memberships for users on Google Cloud☆14Mar 29, 2022Updated 4 years ago
- Automates the setup and maintenance of a docker swarm cluster on CoreOS☆10Aug 14, 2017Updated 8 years ago
- Curated list of Open Source project focused on LLM security☆73Dec 23, 2025Updated 3 months ago
- Agile Threat Modeling Toolkit☆741Apr 8, 2026Updated last week
- "HeaderScan" Burp Plugin☆16Apr 26, 2014Updated 11 years ago
- Presentations, training modules, and other education materials from Duo Security's Application Security team.☆76Jul 15, 2021Updated 4 years ago
- Django middleware and signals for handling security events☆14Apr 14, 2021Updated 5 years ago
- OWASP Foundation Web Respository☆56Oct 4, 2025Updated 6 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Threat matrix for CI/CD Pipeline☆762Jul 8, 2024Updated last year
- 🌎 A command-line application to help determine the location information from a given ip address or url.☆21Mar 29, 2017Updated 9 years ago
- A Pythonic framework for threat modeling☆1,122Apr 9, 2026Updated last week
- A curated list of threat modeling resources (Books, courses - free and paid, videos, tools, tutorials and workshops to practice on ) for …☆1,747Aug 2, 2024Updated last year
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆11Oct 29, 2018Updated 7 years ago
- OWASP Foundation Threat Dragon Project Web Repository☆91Apr 2, 2026Updated 2 weeks ago
- Fork Threat Modeling Platform - Community☆28Oct 10, 2025Updated 6 months ago