Bristol-Cyber-Security-Group / decisions-disruptions-kitLinks
Getting started with Decisions-Disruptions
☆11Updated 5 years ago
Alternatives and similar repositories for decisions-disruptions-kit
Users that are interested in decisions-disruptions-kit are comparing it to the libraries listed below
Sorting:
- An online multiplayer version of the Elevation of Privilege (EoP) threat modeling card game☆147Updated 3 months ago
- The Elevation of Privilege Threat Modeling Game☆338Updated last year
- AI featured threat modeling and security review project☆16Updated 11 months ago
- The OpenSSF CVE Benchmark consists of code and metadata for over 200 real life CVEs, as well as tooling to analyze the vulnerable codebas…☆153Updated last year
- This repository stores content that can be used to design a Rapid Threat Model Prototyping process for a software development group.☆164Updated 2 years ago
- ☆88Updated last month
- A taxonomy of attacks on software supply chains in the form of an attack tree, based on and linked to numerous real-world incidents and o…☆79Updated last month
- SDK for building SecDim Play challenges, an open training game for AppSec, DevSecOps, CloudSec, etc.☆30Updated 2 months ago
- ☆88Updated 4 years ago
- A static analyzer powered by AI☆22Updated last year
- A tool to automatically build a dependency graph and Software Bill of Materials (SBOM) for packages and arbitrary source code repositorie…☆372Updated 2 weeks ago
- NextJS-based single-page application for completing and reviewing SAMM assessments☆77Updated 2 years ago
- App that simplifies building decision trees to model adverse scenarios☆219Updated last year
- A dataset of software supply chain compromises. Please help us maintain it!☆130Updated 3 years ago
- 🧪 Correlate Semgrep scans with Python test coverage to prioritize SAST findings and get bug fix suggestions via a self-hosted LLM.☆41Updated 10 months ago
- Core model including reused documentation☆99Updated 5 months ago
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆177Updated 11 months ago
- Project intended to make Attack Maps part of software development by reducing the time it takes to complete them.☆48Updated 8 years ago
- A curated list of Awesome Security Challenges.☆196Updated 11 months ago
- Privacy Cards for Software Developers☆53Updated 6 years ago
- OWASP IoT Security Verification Standard (ISVS)☆145Updated 3 weeks ago
- IriusRisk Community☆67Updated 2 years ago
- ☆151Updated last month
- A collection of DevSecOps reference architectures☆70Updated 4 years ago
- Documentation on the Cyber Defense Matrix☆24Updated 2 years ago
- An extensive list of resources related to threat modelling. Gotta catch ’em all!☆40Updated last month
- AI featured threat modeling and security review action☆44Updated 11 months ago
- A Continuous Threat Modeling methodology☆327Updated 3 years ago
- CVSS v4.0 calculator☆46Updated 5 months ago
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆79Updated last year