OWASP Ontology-driven Threat Modelling framework
☆41Jul 11, 2023Updated 2 years ago
Alternatives and similar repositories for OdTM
Users that are interested in OdTM are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A compiler for the Meta Attack Language☆15Apr 11, 2022Updated 3 years ago
- version 2 of the Unified Cybersecurity Ontology☆16May 7, 2017Updated 8 years ago
- .NET ASP.NET Security Analyser - Consolidation of multiple ASP.NET OWASP tools☆15Apr 25, 2015Updated 10 years ago
- This project is about creating and publishing threat model examples.☆431Nov 10, 2021Updated 4 years ago
- OWASP Threat Dragon core files☆29May 15, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Unofficial Nessus Scanner Docker container Image.☆24Jan 9, 2026Updated 3 months ago
- GitHub action to run Threagile, the agile threat modeling toolkit, on a repo's threagile.yaml file☆14May 3, 2024Updated last year
- This repository is for development of the Unified Cyber Ontology.☆109Mar 13, 2026Updated 3 weeks ago
- ☆10Jan 21, 2019Updated 7 years ago
- Docker build of GovReady☆14Nov 14, 2023Updated 2 years ago
- MALOnt - an ontology for Malware Threat Intelligence.☆13Jul 8, 2021Updated 4 years ago
- A Visual Studio Code extension for cht.sh / cheat.sh☆13Jul 25, 2018Updated 7 years ago
- Get all cve corresponding to a specific keyword or a list of keywords from the mitre database (https://cve.mitre.org/)☆17Aug 20, 2022Updated 3 years ago
- Security Control Knowledge Graph☆32Apr 24, 2024Updated last year
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- [DEPRECATED] An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This r…☆13Aug 16, 2023Updated 2 years ago
- ☆37Feb 25, 2025Updated last year
- Vulnerable Task Manager☆22Jan 14, 2025Updated last year
- Cisco Threat Intellligence Model☆74Mar 18, 2026Updated 3 weeks ago
- OWASP Foundation Web Respository☆27Dec 22, 2025Updated 3 months ago
- MeetMind.ai - Automatically Record and Transcribe Meetings☆17Dec 13, 2023Updated 2 years ago
- 🎓Materials for the Hands-On Introduction to OpenFAIR Risk Analysis with Tidyrisk☆14Jan 22, 2021Updated 5 years ago
- Demo setup for compliance-trestle☆39Jan 28, 2026Updated 2 months ago
- attempt to perma root the NEC Terrain android phone☆10Jul 24, 2015Updated 10 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Threat Model analysis for MARA modular robot☆26Sep 3, 2019Updated 6 years ago
- This repo is for LinkedIn Learning course: Complete Guide to Data Lakes and Lakehouses with AI☆20Sep 3, 2024Updated last year
- RouteNet version for the Graph Neural Networking Challenge☆12Jun 30, 2020Updated 5 years ago
- MUSIC: MUtation analySIs tool with High Configurability and Extensibility☆18Aug 4, 2023Updated 2 years ago
- A community collection of security reviews of open source software components.☆99Feb 29, 2024Updated 2 years ago
- ☆18Jul 20, 2023Updated 2 years ago
- OpenAI Gym environment for graph search problems such as shortest path.☆11Dec 24, 2019Updated 6 years ago
- Software Component Verification Standard (SCVS)☆157Apr 1, 2025Updated last year
- [NeurIPS'24, Spotlight] CTIBench: A Benchmark for Evaluating LLMs in Cyber Threat Intelligence☆81Feb 11, 2026Updated last month
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- XML metadata and downloads for NIST Technical Series Publications☆27Apr 1, 2026Updated last week
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆12Oct 6, 2020Updated 5 years ago
- TRAM is an open-source platform designed to advance research into automating the mapping of cyber threat intelligence reports to MITRE AT…☆558May 6, 2025Updated 11 months ago
- Burp Suite Configuration Tweak☆13Mar 15, 2024Updated 2 years ago
- Agile Threat Modeling Toolkit☆740Mar 30, 2026Updated last week
- ☆35May 13, 2021Updated 4 years ago
- Dynamic ControlFlow Graph and DataFlow Graph for Binary-based Optimization☆22Jul 5, 2017Updated 8 years ago