OWASP / threat-dragon-desktopView external linksLinks
Desktop variant of OWASP Threat Dragon
☆77Jul 8, 2021Updated 4 years ago
Alternatives and similar repositories for threat-dragon-desktop
Users that are interested in threat-dragon-desktop are comparing it to the libraries listed below
Sorting:
- OWASP Threat Dragon core files☆29May 15, 2021Updated 4 years ago
- An open source threat modeling tool from OWASP☆1,318Updated this week
- A minimal Java client for the Nessus XML RPC interface☆23Apr 1, 2017Updated 8 years ago
- This project is about creating and publishing threat model examples.☆427Nov 10, 2021Updated 4 years ago
- Carving tool based in Radare2 & Yara☆16Oct 30, 2018Updated 7 years ago
- A simple scavenger hunt to learn about pentesting a website or web application.☆14Updated this week
- An installable desktop variant of OWASP Threat Dragon☆592Jan 29, 2026Updated 2 weeks ago
- Firepit - STIX Columnar Storage☆17Jun 5, 2024Updated last year
- OWASP Foundation Web Respository☆19Dec 22, 2025Updated last month
- Project intended to make Attack Maps part of software development by reducing the time it takes to complete them.☆47Nov 24, 2016Updated 9 years ago
- Materials for a course based on the Practical Malware Analysis text by Andrew Honig and Michael Sikorski☆19Jan 4, 2019Updated 7 years ago
- OWASP Threat Dragon with Gitlab Integration☆27Nov 6, 2017Updated 8 years ago
- Templates for the Microsoft Threat Modeling Tool☆172Aug 4, 2025Updated 6 months ago
- An open source, online threat modelling tool from OWASP☆484Jul 18, 2025Updated 6 months ago
- The iOS Buster is a groundbreaking penetration testing tool for iOS, capable of performing both static and dynamic testing. It provides d…☆26Mar 31, 2024Updated last year
- Draw.io libraries for threat modeling diagrams☆785Nov 12, 2020Updated 5 years ago
- OWASP Foundation Web Respository☆28Dec 22, 2025Updated last month
- A curated list of threat modeling resources (Books, courses - free and paid, videos, tools, tutorials and workshops to practice on ) for …☆1,707Aug 2, 2024Updated last year
- OWASP Honeypot, Automated Deception Framework.☆474Sep 15, 2024Updated last year
- Django with Data Science [Video], published by Packt☆12Dec 15, 2025Updated 2 months ago
- A terminal UI to monitor and query Elasticsearch.☆12May 10, 2024Updated last year
- Create wordlists from source codes files/directories for enumeration☆30Jul 18, 2023Updated 2 years ago
- Agile Threat Modeling Toolkit☆723Nov 20, 2025Updated 2 months ago
- attempt to perma root the NEC Terrain android phone☆10Jul 24, 2015Updated 10 years ago
- Grouper Python Client Library☆10Apr 18, 2023Updated 2 years ago
- The official Prewikka GitHub mirror of https://www.prelude-siem.org/projects/prewikka/repository☆10Sep 11, 2020Updated 5 years ago
- a curated list of useful threat modeling resources☆144Jun 28, 2024Updated last year
- Algorithms for training state-of-the-art neural topic models☆35Aug 25, 2025Updated 5 months ago
- Collection of resources related to the Center for Threat-Informed Defense☆76May 22, 2024Updated last year
- MulVAL: A logic-based, data-driven enterprise network security analyzer - Originally developed at Kansas State University, updated for Cy…☆37May 13, 2024Updated last year
- Client library for the mwdb service by CERT Polska.☆42Sep 25, 2025Updated 4 months ago
- Obsidian plugin: Automatically organizes files into folders based on their extensions.☆12Dec 3, 2025Updated 2 months ago
- YARA rule-based automation system to detect network attacks at byte-level☆13May 12, 2021Updated 4 years ago
- ☆11Apr 25, 2021Updated 4 years ago
- Flipper Zero Protocol Pirate - work in progress by RocketGod☆36Updated this week
- Powershell module to help with all file server tasks without using WMI☆12Feb 15, 2024Updated 2 years ago
- Ensure that your Johnny Decimal system is neat and clean.☆17Nov 14, 2024Updated last year
- Lossless image minification using TinyPNG☆10May 25, 2019Updated 6 years ago
- database-course☆13Jan 6, 2023Updated 3 years ago