OWASP Ontology-driven Threat Modelling framework
☆43Jul 11, 2023Updated 2 years ago
Alternatives and similar repositories for OdTM
Users that are interested in OdTM are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆22Jan 6, 2022Updated 4 years ago
- A compiler for the Meta Attack Language☆16Apr 11, 2022Updated 4 years ago
- ☆16Oct 31, 2024Updated last year
- version 2 of the Unified Cybersecurity Ontology☆16May 7, 2017Updated 8 years ago
- A commandline tool that wraps the Archerysec REST API for controlling Archery and executing quick, targeted scans.☆11May 30, 2024Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- This project is about creating and publishing threat model examples.☆433Nov 10, 2021Updated 4 years ago
- OWASP Threat Dragon core files☆29May 15, 2021Updated 4 years ago
- Unofficial Nessus Scanner Docker container Image.☆24Jan 9, 2026Updated 3 months ago
- verinice.veo is a cloud-native application for managing information security and data protection☆23Updated this week
- GitHub action to run Threagile, the agile threat modeling toolkit, on a repo's threagile.yaml file☆14May 3, 2024Updated last year
- This repository is for development of the Unified Cyber Ontology.☆111Apr 10, 2026Updated 2 weeks ago
- A tool to find security vulnerabilities in Xamarin.Android apps.☆12Mar 28, 2022Updated 4 years ago
- Docker build of GovReady☆14Nov 14, 2023Updated 2 years ago
- MALOnt - an ontology for Malware Threat Intelligence.☆13Jul 8, 2021Updated 4 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- A Visual Studio Code extension for cht.sh / cheat.sh☆13Jul 25, 2018Updated 7 years ago
- Get all cve corresponding to a specific keyword or a list of keywords from the mitre database (https://cve.mitre.org/)☆17Aug 20, 2022Updated 3 years ago
- Security Control Knowledge Graph☆32Apr 24, 2024Updated 2 years ago
- ☆37Feb 25, 2025Updated last year
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆72Jun 25, 2025Updated 10 months ago
- OWASP Foundation Web Respository☆27Dec 22, 2025Updated 4 months ago
- MeetMind.ai - Automatically Record and Transcribe Meetings☆17Dec 13, 2023Updated 2 years ago
- 🎓Materials for the Hands-On Introduction to OpenFAIR Risk Analysis with Tidyrisk☆14Jan 22, 2021Updated 5 years ago
- Threat Model analysis for MARA modular robot☆26Sep 3, 2019Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Fork Threat Modeling Platform - Community☆28Oct 10, 2025Updated 6 months ago
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆417Updated this week
- MUSIC: MUtation analySIs tool with High Configurability and Extensibility☆18Updated this week
- A community collection of security reviews of open source software components.☆99Feb 29, 2024Updated 2 years ago
- ☆18Jul 20, 2023Updated 2 years ago
- A mutation tool for source and IR☆13Sep 6, 2018Updated 7 years ago
- OpenAI Gym environment for graph search problems such as shortest path.☆11Dec 24, 2019Updated 6 years ago
- BNNetSimulator is a packet-level network simulator to generate datasets for research and analysis.☆18Feb 8, 2024Updated 2 years ago
- [NeurIPS'24, Spotlight] CTIBench: A Benchmark for Evaluating LLMs in Cyber Threat Intelligence☆83Feb 11, 2026Updated 2 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- XML metadata and downloads for NIST Technical Series Publications☆27Apr 1, 2026Updated 3 weeks ago
- Etcd as a Configuration Source + Configuration Provider☆15Mar 15, 2017Updated 9 years ago
- TRAM is an open-source platform designed to advance research into automating the mapping of cyber threat intelligence reports to MITRE AT…☆561May 6, 2025Updated 11 months ago
- ☆19Oct 19, 2021Updated 4 years ago
- Stratified synthesis for learning machine code instruction semantics☆41Sep 24, 2025Updated 7 months ago
- A tools for JavaScript Recon☆24Jul 25, 2020Updated 5 years ago
- ☆35May 13, 2021Updated 4 years ago