OWASP / www-project-threat-dragonView external linksLinks
OWASP Foundation Threat Dragon Project Web Repository
☆88Feb 1, 2026Updated 2 weeks ago
Alternatives and similar repositories for www-project-threat-dragon
Users that are interested in www-project-threat-dragon are comparing it to the libraries listed below
Sorting:
- An open source threat modeling tool from OWASP☆1,318Updated this week
- Agile Threat Modeling Toolkit☆723Nov 20, 2025Updated 2 months ago
- This project is about creating and publishing threat model examples.☆427Nov 10, 2021Updated 4 years ago
- Helpers for getting CHN up and running through the Quickstart guide☆12Mar 2, 2021Updated 4 years ago
- SysFlow project APIs☆16Jun 5, 2024Updated last year
- A fully featured Windows backdoor that uses email as a C&C server☆16Aug 19, 2017Updated 8 years ago
- A tool for detecting sensitive data in code repositories☆17Dec 15, 2025Updated 2 months ago
- ☆16May 15, 2024Updated last year
- External no flash for CS:GO☆10Jan 2, 2022Updated 4 years ago
- A reimplementation of the EtherApe style display for OS X. Note that this is not a fork of EtherApe. Written in a kinder, gentler, age …☆21Dec 3, 2018Updated 7 years ago
- OWASP Foundation Web Respository☆16Jun 1, 2022Updated 3 years ago
- OWASP Foundation Web Respository☆22Dec 22, 2025Updated last month
- OWASP Foundation Web Respository☆20Oct 8, 2025Updated 4 months ago
- An automated Python + Ruby based XXE Exploiter (GUI + CLI)☆19Aug 2, 2016Updated 9 years ago
- External bunny hopper for CS:GO☆14Jan 16, 2023Updated 3 years ago
- A simple threat modeling tool to help humans to reduce time-to-value when threat modeling☆671Updated this week
- Python client for DNS over HTTPS (DoH) protocol☆21Jul 9, 2019Updated 6 years ago
- A Python based backdoor that uses Steganography and a Cloud Image Service as a command and control server.☆26Sep 2, 2016Updated 9 years ago
- OWASP Foundation web repository☆21Jan 7, 2026Updated last month
- ☆16Jul 28, 2020Updated 5 years ago
- Open Security Summit 2019☆26Nov 16, 2020Updated 5 years ago
- ☆12May 13, 2020Updated 5 years ago
- Golang installer for DefectDojo☆29Jan 23, 2025Updated last year
- A standard allowing organizations to nominate security contact points and policies via DNS TXT records.☆33Jun 4, 2025Updated 8 months ago
- A Pythonic framework for threat modeling☆1,103Feb 9, 2026Updated last week
- Python Script for SAML2 Authentication Passwordspray☆42Jul 5, 2023Updated 2 years ago
- Miscellaneous analysis tools☆25Mar 3, 2015Updated 10 years ago
- OCA-wide documentation shared by all sub-projects and repositories☆33Oct 31, 2024Updated last year
- Secure Jupyter Notebooks and Experimentation Environment☆85Feb 6, 2025Updated last year
- Draw.io libraries for threat modeling diagrams☆785Nov 12, 2020Updated 5 years ago
- ☆37Nov 22, 2023Updated 2 years ago
- Informações extras referentes ao Treinamento Novo Pentest Profissional - https://desecsecurity.com/novo-pentest-profissional☆15May 13, 2023Updated 2 years ago
- Learn how to hack☆12Aug 15, 2020Updated 5 years ago
- External Hack for Aura Kingdom TO☆14Feb 17, 2023Updated 3 years ago
- scripts☆10Aug 25, 2023Updated 2 years ago
- OWASP Threat Dragon core files☆29May 15, 2021Updated 4 years ago
- Security tools, scanners, exploit code☆31Oct 21, 2017Updated 8 years ago
- A Continuous Threat Modeling methodology☆324Jun 24, 2022Updated 3 years ago
- Threats Manager Platform Core libraries and SDK☆75Dec 22, 2025Updated last month