Desktop variant of OWASP Threat Dragon
☆77Jul 8, 2021Updated 4 years ago
Alternatives and similar repositories for threat-dragon-desktop
Users that are interested in threat-dragon-desktop are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- OWASP Threat Dragon core files☆29May 15, 2021Updated 4 years ago
- OWASP Threat Dragon core files☆11Jan 26, 2026Updated 2 months ago
- ☆37Feb 25, 2025Updated last year
- A Java library for programmatically calculating OWASP Risk Rating scores☆19Apr 3, 2023Updated 2 years ago
- An open source threat modeling tool from OWASP☆1,359Updated this week
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- AutoSecGPT is an AI-power tool that supports security teams to model threats associated with their automotive application to ease the pro…☆13Apr 28, 2025Updated 11 months ago
- OWASP Foundation Web Respository☆19Dec 22, 2025Updated 3 months ago
- This project is about creating and publishing threat model examples.☆431Nov 10, 2021Updated 4 years ago
- An installable desktop variant of OWASP Threat Dragon☆591Jan 29, 2026Updated 2 months ago
- OWASP Threat Dragon with Gitlab Integration☆27Nov 6, 2017Updated 8 years ago
- Carving tool based in Radare2 & Yara☆16Oct 30, 2018Updated 7 years ago
- Draw.io libraries for threat modeling diagrams☆788Nov 12, 2020Updated 5 years ago
- ☆17Feb 3, 2026Updated last month
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆21Dec 2, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A Pythonic framework for threat modeling☆1,114Mar 16, 2026Updated 2 weeks ago
- An open source, online threat modelling tool from OWASP☆484Jul 18, 2025Updated 8 months ago
- Regular expression tools for .NET developers☆12Mar 7, 2026Updated 3 weeks ago
- threatspec - continuous threat modeling, through code☆383Dec 30, 2020Updated 5 years ago
- Monthly CVE Stats☆45Mar 1, 2026Updated 3 weeks ago
- My personal site. Contains my blog and other useful sections☆14Updated this week
- Bits of Terraform that you can use to do bad things in CI/CD pipelines that run Terraform☆10Nov 10, 2020Updated 5 years ago
- A proof of concept implementation of the Siemens S7 protocol analyser for the Bro IDS.☆16Mar 26, 2017Updated 9 years ago
- A curated list of threat modeling resources (Books, courses - free and paid, videos, tools, tutorials and workshops to practice on ) for …☆1,731Aug 2, 2024Updated last year
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- SeaSponge is an accessible threat modelling tool from Mozilla☆281Apr 16, 2018Updated 7 years ago
- Swag for the OWASP projects and chapters☆44Jul 18, 2025Updated 8 months ago
- Templates for the Microsoft Threat Modeling Tool☆178Aug 4, 2025Updated 7 months ago
- OWASP Honeypot, Automated Deception Framework.☆479Sep 15, 2024Updated last year
- This repo is no longer in use. Please refer to https://github.com/OWASP/www-project-vulnerable-web-applications-directory☆883Mar 2, 2026Updated 3 weeks ago
- A command line CWE discovery tool based on OWASP / CAPSEC database of Common Weakness Enumeration.☆63May 31, 2025Updated 10 months ago
- OWASP Foundation Web Respository☆28Dec 5, 2025Updated 3 months ago
- Threat Modeling Tool Extension for Penetration Tester (TMTe4PT)☆12Mar 2, 2022Updated 4 years ago
- Extensible MacOS system telemetry generator.☆55Mar 1, 2026Updated 3 weeks ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- My collection of Cloud Security Resources☆16Apr 16, 2025Updated 11 months ago
- Agile Threat Modeling Toolkit☆738Mar 12, 2026Updated 2 weeks ago
- A collection of the most common English idioms with their related Italian and Spanish translation.☆10Oct 17, 2022Updated 3 years ago
- YARA rule-based automation system to detect network attacks at byte-level☆13May 12, 2021Updated 4 years ago
- PPT of my talks.☆13Jun 23, 2025Updated 9 months ago
- ☆18Updated this week
- ☆14Dec 3, 2022Updated 3 years ago