OWASP Foundation web repository
☆38Apr 3, 2026Updated last month
Alternatives and similar repositories for www-project-threat-model-library
Users that are interested in www-project-threat-model-library are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆181Dec 11, 2025Updated 4 months ago
- ☆35Dec 10, 2020Updated 5 years ago
- OWASP Foundation Web Respository☆23Feb 27, 2026Updated 2 months ago
- ☆36Mar 8, 2022Updated 4 years ago
- OWASP Threat Dragon core files☆11Jan 26, 2026Updated 3 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆19Feb 3, 2026Updated 3 months ago
- Practical Library Of Threats 4 Artificial Intelligence☆38Jun 19, 2025Updated 10 months ago
- Externalize Java application access to protected resources as log messages.☆44Apr 2, 2026Updated last month
- sbomify is a product security artifact hub and a trust center.☆52Updated this week
- Library supporting secure keys, and crypto enabled JSON and CBOR☆17Apr 17, 2026Updated 3 weeks ago
- A documentation and tracking project with the goal of making package management systems more secure.☆51Mar 5, 2021Updated 5 years ago
- Sample SecOps scripts and Utilities☆12Jun 19, 2024Updated last year
- An auto-scoring capture-the-flag game focusing on TOCTOU vulnerabilities☆21Oct 28, 2020Updated 5 years ago
- ☆16Apr 27, 2026Updated last week
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- An extensive list of resources related to threat modelling. Gotta catch ’em all!☆49Apr 29, 2026Updated last week
- Public website cyclonedx.org☆12Dec 20, 2024Updated last year
- SIG Security - Software Bill of Materials☆19Aug 26, 2022Updated 3 years ago
- Code coverage startup for C++ project using GCov and LCov☆14Jun 4, 2021Updated 4 years ago
- A collection of packages for using GitHub security advisories in Node.js.☆18May 3, 2026Updated last week
- Report missing advisories and corrections on OSS Index☆18Jan 19, 2023Updated 3 years ago
- ☆26Aug 31, 2023Updated 2 years ago
- OWASP Foundation Web Respository☆22Oct 9, 2025Updated 7 months ago
- A Java library for calculating CVSSv2, CVSSv3, and CVSSv4 scores and vectors☆51Jan 22, 2026Updated 3 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- OWASP Foundation Web Respository☆20Dec 22, 2025Updated 4 months ago
- GitHub action to generate a CycloneDX SBOM for Node.js☆22Jul 11, 2025Updated 9 months ago
- A stealthy, fast and easy tool to spray Active Directory credentials and bypass AD credential spraying controls.☆13Oct 13, 2022Updated 3 years ago
- CodeQL and Binary Ninja scripts to accompany the blog post☆11Feb 3, 2023Updated 3 years ago
- Desktop variant of OWASP Threat Dragon☆77Jul 8, 2021Updated 4 years ago
- The Open Security Summit is focused on the collaboration between, Developers and Application Security☆45Jul 9, 2025Updated 10 months ago
- ☆10Sep 11, 2020Updated 5 years ago
- The vulnerability management guide should help to breakdown vulnerability management process into a manageable repeatable cycles tailored…☆16Jul 23, 2020Updated 5 years ago
- ☆15Mar 16, 2026Updated last month
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- https://pinkdraconian.gitbook.io/methodology/☆14Aug 24, 2021Updated 4 years ago
- Scripts and Web Application for folk music tune transcription and recognition☆28Dec 5, 2024Updated last year
- ☆17Updated this week
- A terminal-based interactive chat interface for Meshtastic LoRa devices. `meshtui` provides a curses-powered UI for real-time messaging, …☆30Oct 15, 2025Updated 6 months ago
- The AI Security Verification Standard (AISVS) focuses on providing developers, architects, and security professionals with a structured c…☆141Updated this week
- Proxy Management for Security Professionals☆25Mar 25, 2025Updated last year
- Rapid Assessment of Web Resources☆19Nov 11, 2016Updated 9 years ago