OWASP Ontology-driven Threat Modelling framework
☆40Jul 11, 2023Updated 2 years ago
Alternatives and similar repositories for OdTM
Users that are interested in OdTM are comparing it to the libraries listed below
Sorting:
- A compiler for the Meta Attack Language☆15Apr 11, 2022Updated 3 years ago
- version 2 of the Unified Cybersecurity Ontology☆16May 7, 2017Updated 8 years ago
- .NET ASP.NET Security Analyser - Consolidation of multiple ASP.NET OWASP tools☆15Apr 25, 2015Updated 10 years ago
- OWASP Threat Dragon with Gitlab Integration☆27Nov 6, 2017Updated 8 years ago
- This project is about creating and publishing threat model examples.☆429Nov 10, 2021Updated 4 years ago
- OWASP Threat Dragon core files☆29May 15, 2021Updated 4 years ago
- verinice.veo is a cloud-native application for managing information security and data protection☆22Updated this week
- GitHub action to run Threagile, the agile threat modeling toolkit, on a repo's threagile.yaml file☆14May 3, 2024Updated last year
- ☆10Jan 21, 2019Updated 7 years ago
- ☆20Aug 21, 2021Updated 4 years ago
- Interactive visualizer for e-graphs☆28Jan 13, 2026Updated 2 months ago
- MALOnt - an ontology for Malware Threat Intelligence.☆13Jul 8, 2021Updated 4 years ago
- Get all cve corresponding to a specific keyword or a list of keywords from the mitre database (https://cve.mitre.org/)☆17Aug 20, 2022Updated 3 years ago
- Security Control Knowledge Graph☆32Apr 24, 2024Updated last year
- ☆37Feb 25, 2025Updated last year
- [DEPRECATED] An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This r…☆13Aug 16, 2023Updated 2 years ago
- Paradigm is an open source tool that looks at your network landscape and determines what is actually accessible via the internet.☆19Jan 8, 2023Updated 3 years ago
- A simple script that generates an Excel friendly CSV file from an Amass JSON file.☆13May 6, 2022Updated 3 years ago
- Vulnerable Task Manager☆22Jan 14, 2025Updated last year
- Demo setup for compliance-trestle☆37Jan 28, 2026Updated last month
- MeetMind.ai - Automatically Record and Transcribe Meetings☆17Dec 13, 2023Updated 2 years ago
- 🎓Materials for the Hands-On Introduction to OpenFAIR Risk Analysis with Tidyrisk☆14Jan 22, 2021Updated 5 years ago
- Threat Model analysis for MARA modular robot☆26Sep 3, 2019Updated 6 years ago
- Fork Threat Modeling Platform - Community☆27Oct 10, 2025Updated 5 months ago
- MUSIC: MUtation analySIs tool with High Configurability and Extensibility☆18Aug 4, 2023Updated 2 years ago
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆409Updated this week
- OpenAI Gym environment for graph search problems such as shortest path.☆11Dec 24, 2019Updated 6 years ago
- Software Component Verification Standard (SCVS)☆157Apr 1, 2025Updated 11 months ago
- BNNetSimulator is a packet-level network simulator to generate datasets for research and analysis.☆18Feb 8, 2024Updated 2 years ago
- ☆80Feb 11, 2026Updated last month
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆12Oct 6, 2020Updated 5 years ago
- 🚨ATTENTION🚨 The CVE mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here as…☆240Apr 3, 2024Updated last year
- Stratified synthesis for learning machine code instruction semantics☆41Sep 24, 2025Updated 5 months ago
- A tools for JavaScript Recon☆24Jul 25, 2020Updated 5 years ago
- Agile Threat Modeling Toolkit☆736Mar 12, 2026Updated last week
- ☆35May 13, 2021Updated 4 years ago
- ☆23Dec 14, 2020Updated 5 years ago
- A simple utility to generate real File and Active Directory activity in lab environments for the purposes of monitoring changes and detec…☆11Dec 4, 2018Updated 7 years ago
- Attack Tree modeling sheet for Dia☆20Oct 9, 2018Updated 7 years ago