AzureArchitecture / threat-model-templatesView external linksLinks
Templates for the Microsoft Threat Modeling Tool
☆172Aug 4, 2025Updated 6 months ago
Alternatives and similar repositories for threat-model-templates
Users that are interested in threat-model-templates are comparing it to the libraries listed below
Sorting:
- Microsoft Threat Modeling Template files☆201Nov 28, 2022Updated 3 years ago
- Open Threat Modeling Template☆52Jul 10, 2024Updated last year
- This project is about creating and publishing threat model examples.☆427Nov 10, 2021Updated 4 years ago
- NCC Group Template for the Microsoft Threat Modeling Tool 2016 for Automotive Security☆48Jul 10, 2020Updated 5 years ago
- A Java library for programmatically calculating OWASP Risk Rating scores☆19Apr 3, 2023Updated 2 years ago
- StartLeft is an automation tool for generating Threat Models written in the Open Threat Model (OTM) format from a variety of different so…☆52Nov 25, 2025Updated 2 months ago
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆68Jun 25, 2025Updated 7 months ago
- An open source threat modeling tool from OWASP☆1,310Feb 4, 2026Updated last week
- A curated list of threat modeling resources (Books, courses - free and paid, videos, tools, tutorials and workshops to practice on ) for …☆1,706Aug 2, 2024Updated last year
- PowerShell Memory Pulling script☆19Mar 24, 2015Updated 10 years ago
- A repository for development of the TAXII Specifications. For official releases, please see http://taxiiproject.github.io/releases/☆41Nov 29, 2015Updated 10 years ago
- Threats Manager Platform Core libraries and SDK☆75Dec 22, 2025Updated last month
- threatspec - continuous threat modeling, through code☆376Dec 30, 2020Updated 5 years ago
- Sightings Ecosystem gives cyber defenders visibility into what adversaries actually do in the wild. With your help, we are tracking MITRE…☆38May 28, 2025Updated 8 months ago
- ☆88Jul 28, 2021Updated 4 years ago
- A Continuous Threat Modeling methodology☆324Jun 24, 2022Updated 3 years ago
- read the docs version of risk management☆27Mar 6, 2023Updated 2 years ago
- Interactsh deployment to AWS EC2 Instance with Terraform☆11Dec 29, 2021Updated 4 years ago
- Are you able to use open source intelligence to solve this challenge?☆11Apr 14, 2019Updated 6 years ago
- A curated list of CTF frameworks, libraries, resources and softwares☆10Nov 11, 2015Updated 10 years ago
- Pragmatic Network Security for Cloud and Hybrid Networks☆10Nov 24, 2015Updated 10 years ago
- Proof of concept implementation of a cyber threat intelligence and incident handling platform☆11Feb 10, 2023Updated 3 years ago
- An installable desktop variant of OWASP Threat Dragon☆592Jan 29, 2026Updated 2 weeks ago
- AT-AT (Attack Tree Analysis Tool) is a application that allows users to develop and analyze attack trees. The overall goal is to automati…☆29Aug 17, 2022Updated 3 years ago
- An open source, online threat modelling tool from OWASP☆484Jul 18, 2025Updated 6 months ago
- a curated list of useful threat modeling resources☆144Jun 28, 2024Updated last year
- Bitclamp allows arbitrary files to be permanently and anonymously published into the Bitcoin and Dogecoin blockchains.☆14Jan 12, 2017Updated 9 years ago
- Just an experiment with hash cracking :) few password lists along with some good password cracking rule sets.☆13Feb 29, 2020Updated 5 years ago
- A Windows PowerShell & PowerShell Core Module to calculate a CVSS3 Score based on a Vector string☆12Dec 20, 2022Updated 3 years ago
- ☆14Dec 3, 2022Updated 3 years ago
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆403Feb 2, 2026Updated last week
- Privacy Cards for Software Developers☆54May 17, 2019Updated 6 years ago
- NMap XML decoding for logstash☆28Nov 16, 2022Updated 3 years ago
- Updated incident response generator for training classes☆44Jun 2, 2021Updated 4 years ago
- A Java library for parsing and programmatically using threat models☆82Feb 15, 2023Updated 2 years ago
- Jupyter Notebooks and code used for DNS MX mining to identify top email security providers☆57Jun 29, 2023Updated 2 years ago
- WARNING: This is a vulnerable application to test the exploit for the Spring Break vulnerability (CVE-2017-8046). Run it at your own risk…☆14Oct 8, 2018Updated 7 years ago
- Proof-Of-Concept SSH Worm. Not for illegal use.☆14Mar 21, 2018Updated 7 years ago
- Segment's Threat Modeling training for our engineers☆245May 4, 2021Updated 4 years ago