☆36Mar 8, 2022Updated 4 years ago
Alternatives and similar repositories for threat-modeling-playbook
Users that are interested in threat-modeling-playbook are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Provides content useful for IriusRisk threat modelling, including templates, API scripts, libraries and more.☆16Feb 10, 2026Updated 2 months ago
- OWASP Foundation web repository☆36Apr 3, 2026Updated last week
- Step template - DEPRECATED, please use the `step` plugin and its built in template instead (https://github.com/bitrise-core/bitrise-plugi…☆10Dec 1, 2023Updated 2 years ago
- OWASP Foundation Web Respository☆28Dec 22, 2025Updated 3 months ago
- ☆14Dec 3, 2022Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆88Jul 28, 2021Updated 4 years ago
- Listo. Use questionnaires and checklists to make it easy to do the right thing, regarding the software you build.☆28Apr 7, 2023Updated 3 years ago
- threatspec - continuous threat modeling, through code☆383Dec 30, 2020Updated 5 years ago
- This project is about creating and publishing threat model examples.☆432Nov 10, 2021Updated 4 years ago
- Finds internet-exposed resources in an AWS account☆18Sep 1, 2024Updated last year
- 🖇️ equivalence table between OWASP ASVS standard and STRIDE threat modeling methodology.☆76Aug 22, 2024Updated last year
- OWASP Threat Dragon core files☆11Jan 26, 2026Updated 2 months ago
- ☆18Feb 3, 2026Updated 2 months ago
- ☆32May 22, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Core model including reused documentation☆103Dec 16, 2025Updated 4 months ago
- ☆125Nov 8, 2023Updated 2 years ago
- Agile Threat Modeling Toolkit☆741Apr 8, 2026Updated last week
- An auto-scoring capture-the-flag game focusing on TOCTOU vulnerabilities☆21Oct 28, 2020Updated 5 years ago
- A collection of DevSecOps reference architectures☆71Feb 7, 2021Updated 5 years ago
- InfoSec OpenAI Examples☆19Nov 26, 2023Updated 2 years ago
- ☆35Dec 10, 2020Updated 5 years ago
- Semgrep rules corresponding to the OWASP ASVS standard☆27Nov 2, 2020Updated 5 years ago
- The source files and tools needed to build the OWASP Cornucopia decks in various languages☆123Updated this week
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆70Jun 25, 2025Updated 9 months ago
- An open source threat modeling tool from OWASP☆1,415Updated this week
- Dragon-GPT uses Chat-GPT, or local LLM, to execute automatic and AI-powered threat modeling analysis on a given OWASP Threat Dragon diagr…☆42Jun 20, 2025Updated 9 months ago
- Code coverage startup for C++ project using GCov and LCov☆14Jun 4, 2021Updated 4 years ago
- An online multiplayer version of the Elevation of Privilege (EoP) threat modeling card game☆160Apr 2, 2026Updated 2 weeks ago
- This terraform provider can be used to get remote code execution by injecting a dummy resource in a writeable state file.☆63Jan 25, 2025Updated last year
- OWASP Foundation Web Respository☆22Oct 9, 2025Updated 6 months ago
- A documentation and tracking project with the goal of making package management systems more secure.☆51Mar 5, 2021Updated 5 years ago
- OWASP Foundation Web Respository☆20Dec 22, 2025Updated 3 months ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- GitHub action to generate a CycloneDX SBOM for Node.js☆22Jul 11, 2025Updated 9 months ago
- SAMMY Open Source v2☆14Feb 6, 2025Updated last year
- [Fugitive was made to offer resourcfulness to 'Osint Investigations' Fugitive will allow you to collect detailed information about "subje…☆36Jun 9, 2023Updated 2 years ago
- Repo for hosting various scripts for creating users for password spraying and other password attacks.☆11Jul 9, 2020Updated 5 years ago
- pam-backdoor allows you to login any account by your password if the box uses pam_unix or let me say /etc/passwd☆12May 3, 2013Updated 12 years ago
- ☆46Jan 22, 2026Updated 2 months ago
- ☆38Jan 22, 2026Updated 2 months ago