Desktop variant of OWASP Threat Dragon
☆77Jul 8, 2021Updated 4 years ago
Alternatives and similar repositories for threat-dragon-desktop
Users that are interested in threat-dragon-desktop are comparing it to the libraries listed below
Sorting:
- OWASP Threat Dragon core files☆29May 15, 2021Updated 4 years ago
- OWASP Threat Dragon core files☆11Jan 26, 2026Updated last month
- A Java library for programmatically calculating OWASP Risk Rating scores☆19Apr 3, 2023Updated 2 years ago
- An open source threat modeling tool from OWASP☆1,337Updated this week
- ☆37Feb 25, 2025Updated last year
- This project is about creating and publishing threat model examples.☆429Nov 10, 2021Updated 4 years ago
- AutoSecGPT is an AI-power tool that supports security teams to model threats associated with their automotive application to ease the pro…☆13Apr 28, 2025Updated 10 months ago
- Workflows for Alfred 2.☆37Aug 29, 2018Updated 7 years ago
- A simple scavenger hunt to learn about pentesting a website or web application.☆15Feb 12, 2026Updated 3 weeks ago
- A proof of concept implementation of the Siemens S7 protocol analyser for the Bro IDS.☆16Mar 26, 2017Updated 8 years ago
- An installable desktop variant of OWASP Threat Dragon☆592Jan 29, 2026Updated last month
- Firepit - STIX Columnar Storage☆18Jun 5, 2024Updated last year
- OWASP Foundation Web Respository☆19Dec 22, 2025Updated 2 months ago
- Project intended to make Attack Maps part of software development by reducing the time it takes to complete them.☆47Nov 24, 2016Updated 9 years ago
- OWASP Threat Dragon with Gitlab Integration☆27Nov 6, 2017Updated 8 years ago
- Rebuild of portspoof in GO with additional features.☆29Oct 24, 2025Updated 4 months ago
- An open source, online threat modelling tool from OWASP☆484Jul 18, 2025Updated 7 months ago
- The iOS Buster is a groundbreaking penetration testing tool for iOS, capable of performing both static and dynamic testing. It provides d…☆26Mar 31, 2024Updated last year
- Draw.io libraries for threat modeling diagrams☆786Nov 12, 2020Updated 5 years ago
- A curated list of threat modeling resources (Books, courses - free and paid, videos, tools, tutorials and workshops to practice on ) for …☆1,719Aug 2, 2024Updated last year
- threatspec - continuous threat modeling, through code☆382Dec 30, 2020Updated 5 years ago
- A terminal UI to monitor and query Elasticsearch.☆12May 10, 2024Updated last year
- Django with Data Science [Video], published by Packt☆12Dec 15, 2025Updated 2 months ago
- OWASP Honeypot, Automated Deception Framework.☆478Sep 15, 2024Updated last year
- SeaSponge is an accessible threat modelling tool from Mozilla☆281Apr 16, 2018Updated 7 years ago
- Agile Threat Modeling Toolkit☆735Nov 20, 2025Updated 3 months ago
- AI Agent for Threat Modeling☆13May 27, 2025Updated 9 months ago
- This is a curated collection of articles and research papers related to the unexpected or unwanted outcomes , security & privacy ri…☆11Dec 17, 2025Updated 2 months ago
- ssh user enumeration☆12Mar 21, 2023Updated 2 years ago
- Grouper Python Client Library☆10Apr 18, 2023Updated 2 years ago
- Fresh DNS servers☆85Feb 8, 2026Updated last month
- The ICS Advisory Project is an open-source project to provide CISA ICS Advisories data in Comma Separated Value (CSV) format to support v…☆92Updated this week
- Graphoscope is a solution to access multiple independent data sources from a common UI and show data relations as a graph☆41Sep 25, 2025Updated 5 months ago
- Algorithms for training state-of-the-art neural topic models☆35Aug 25, 2025Updated 6 months ago
- a curated list of useful threat modeling resources☆147Jun 28, 2024Updated last year
- Collection of resources related to the Center for Threat-Informed Defense☆76May 22, 2024Updated last year
- Client library for the mwdb service by CERT Polska.☆42Feb 10, 2026Updated last month
- Malware similarity platform with modularity in mind.☆80Jul 18, 2021Updated 4 years ago
- Powershell module to help with all file server tasks without using WMI☆13Feb 25, 2026Updated last week