☆18Jan 26, 2019Updated 7 years ago
Alternatives and similar repositories for human_threat_model
Users that are interested in human_threat_model are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Just a small demo of CVSS V3.0 Scoring in an excel spreadsheet☆12Apr 1, 2018Updated 8 years ago
- Extract CIS benchmarks from PDFs☆16Jul 26, 2023Updated 2 years ago
- ☆10Dec 19, 2024Updated last year
- Exploit ConnectWise ScreenConnect (bypass authentication)☆13Feb 21, 2024Updated 2 years ago
- A repository with data about APTs☆13Nov 24, 2022Updated 3 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ☆13Sep 15, 2024Updated last year
- A free data collection and YARA scanning tool for cybersecurity incident investigation, compromise assessment and threat hunting☆22Nov 12, 2024Updated last year
- OPA policies for securing Docker API☆11Aug 14, 2023Updated 2 years ago
- ☆19Dec 5, 2024Updated last year
- Aggregated ATT&CK technique reporting data. Presented at Splunk GovSummit December 2022☆17Jul 18, 2025Updated 9 months ago
- Мой читшит. Можно использовать, но рекомендую сделать свой.☆18Nov 26, 2024Updated last year
- Baby sleep guides curated from the best of the Internet.☆18Oct 19, 2014Updated 11 years ago
- Microsoft Entra ID mindmap visualizer — users, devices, groups, apps & CA policies in one view☆44Apr 26, 2026Updated last week
- Tools for analyzing Windows containers and break container's isolation☆33Aug 2, 2022Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆38Jun 6, 2017Updated 8 years ago
- CVE-2020-16899 - Microsoft Windows TCP/IP Vulnerability Detection Logic and Rule☆20Oct 19, 2020Updated 5 years ago
- Tool to obtain hash using MS-SNTP for user accounts☆30Jan 22, 2025Updated last year
- ☆35Feb 12, 2026Updated 2 months ago
- Astrix Security MCP Secret Wrapper☆49Apr 22, 2026Updated last week
- Exchange Online Protection & Microsoft Defender For Office 365 Hardering Tool☆12Jan 14, 2023Updated 3 years ago
- Script out the quirks of adding a AMD GPU passthrough☆21Jan 15, 2024Updated 2 years ago
- This is the Network Flow Generator for ICSSIM☆18Aug 28, 2025Updated 8 months ago
- A collection of resources related to vulnerability management.☆15Aug 8, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆51Apr 25, 2024Updated 2 years ago
- HoneyDB Python Module☆14Feb 6, 2024Updated 2 years ago
- Library for reading KeePass files and decrypt the passwords within it☆14Jun 25, 2024Updated last year
- AI Security Newsletter - A monthly digest of AI security research, insights, reports, upcoming events, and tools & resources☆36Feb 5, 2026Updated 3 months ago
- ICS attack simulator for the Tennessee Eastman Process. From the NDSS 2024 paper: "Attributions for ML-based ICS anomaly detection: From …☆16Aug 31, 2023Updated 2 years ago
- Plusfish is a classic web application vulnerability scanner/fuzzer and aimed at security professionals☆27Aug 22, 2022Updated 3 years ago
- YAFRA is a semi-automated framework for analyzing and representing reports about IT Security incidents.☆27Dec 14, 2021Updated 4 years ago
- ☆21Jul 16, 2025Updated 9 months ago
- ☆18Apr 13, 2026Updated 3 weeks ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Smart weather dashboard. Integrates with OpenWeatherMaps and Ecobee. Designed to run on RaspberryPi.☆16Aug 19, 2023Updated 2 years ago
- A CALDERA plugin for autonomous incident response☆27Mar 18, 2026Updated last month
- ☆18Nov 5, 2020Updated 5 years ago
- Denky D4 WiFi Teleinfo☆23Updated this week
- Guide to migrate applications from AFDS to AAD☆16May 31, 2023Updated 2 years ago
- (Unofficial) Python API for https://sslbl.abuse.ch/☆11Dec 9, 2016Updated 9 years ago
- This repo exists as a quick and dirty arsenal of methods and scripts to subvert .NET SSL/TLS certificate validation in PowerShell and pre…☆12Jan 28, 2017Updated 9 years ago