Templates for the Microsoft Threat Modeling Tool
☆174Aug 4, 2025Updated 7 months ago
Alternatives and similar repositories for threat-model-templates
Users that are interested in threat-model-templates are comparing it to the libraries listed below
Sorting:
- Microsoft Threat Modeling Template files☆202Nov 28, 2022Updated 3 years ago
- Open Threat Modeling Template☆52Jul 10, 2024Updated last year
- This project is about creating and publishing threat model examples.☆429Nov 10, 2021Updated 4 years ago
- A Java library for programmatically calculating OWASP Risk Rating scores☆19Apr 3, 2023Updated 2 years ago
- StartLeft is an automation tool for generating Threat Models written in the Open Threat Model (OTM) format from a variety of different so…☆53Nov 25, 2025Updated 3 months ago
- A full example report☆11Jul 23, 2019Updated 6 years ago
- A Pythonic framework for threat modeling☆1,110Feb 24, 2026Updated last week
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆69Jun 25, 2025Updated 8 months ago
- Amazon Web Services (AWS) Microsoft Threat Modeling Tool Template☆16Aug 19, 2021Updated 4 years ago
- Agile Threat Modeling Toolkit☆727Nov 20, 2025Updated 3 months ago
- An open source threat modeling tool from OWASP☆1,337Updated this week
- Draw.io libraries for threat modeling diagrams☆786Nov 12, 2020Updated 5 years ago
- A curated list of threat modeling resources (Books, courses - free and paid, videos, tools, tutorials and workshops to practice on ) for …☆1,719Aug 2, 2024Updated last year
- PowerShell Memory Pulling script☆19Mar 24, 2015Updated 10 years ago
- A repository for development of the TAXII Specifications. For official releases, please see http://taxiiproject.github.io/releases/☆41Nov 29, 2015Updated 10 years ago
- threatspec - continuous threat modeling, through code☆379Dec 30, 2020Updated 5 years ago
- Sightings Ecosystem gives cyber defenders visibility into what adversaries actually do in the wild. With your help, we are tracking MITRE…☆38May 28, 2025Updated 9 months ago
- ☆88Jul 28, 2021Updated 4 years ago
- A Continuous Threat Modeling methodology☆324Jun 24, 2022Updated 3 years ago
- App that simplifies building decision trees to model adverse scenarios☆228Jul 11, 2024Updated last year
- read the docs version of risk management☆27Mar 6, 2023Updated 3 years ago
- Proof of concept implementation of a cyber threat intelligence and incident handling platform☆11Feb 10, 2023Updated 3 years ago
- Interactsh deployment to AWS EC2 Instance with Terraform☆11Dec 29, 2021Updated 4 years ago
- OpenDXL Console is a high-level web-based console for interacting with a DXL fabric☆11Mar 29, 2021Updated 4 years ago
- Pragmatic Network Security for Cloud and Hybrid Networks☆10Nov 24, 2015Updated 10 years ago
- A curated list of CTF frameworks, libraries, resources and softwares☆10Nov 11, 2015Updated 10 years ago
- An installable desktop variant of OWASP Threat Dragon☆592Jan 29, 2026Updated last month
- AT-AT (Attack Tree Analysis Tool) is a application that allows users to develop and analyze attack trees. The overall goal is to automati…☆29Aug 17, 2022Updated 3 years ago
- This guide is intended to provide considerations when designing an Azure sandbox solution for your organizations Microsoft Azure focused …☆26Oct 26, 2023Updated 2 years ago
- An open source, online threat modelling tool from OWASP☆484Jul 18, 2025Updated 7 months ago
- a curated list of useful threat modeling resources☆147Jun 28, 2024Updated last year
- Just an experiment with hash cracking :) few password lists along with some good password cracking rule sets.☆13Feb 29, 2020Updated 6 years ago
- Bitclamp allows arbitrary files to be permanently and anonymously published into the Bitcoin and Dogecoin blockchains.☆14Jan 12, 2017Updated 9 years ago
- A simple utility to generate real File and Active Directory activity in lab environments for the purposes of monitoring changes and detec…☆11Dec 4, 2018Updated 7 years ago
- ☆14Dec 3, 2022Updated 3 years ago
- Tools to measure the maturity of Enterprise Security Architecture processes☆13Sep 22, 2017Updated 8 years ago
- A Windows PowerShell & PowerShell Core Module to calculate a CVSS3 Score based on a Vector string☆12Dec 20, 2022Updated 3 years ago
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆408Updated this week
- Desktop variant of OWASP Threat Dragon☆77Jul 8, 2021Updated 4 years ago