A collection of real-world threat model examples across various technologies, providing practical insights into identifying and mitigating security risks.
☆493Jun 12, 2025Updated 10 months ago
Alternatives and similar repositories for Threat_Model_Examples
Users that are interested in Threat_Model_Examples are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A curated list of threat modeling resources (Books, courses - free and paid, videos, tools, tutorials and workshops to practice on ) for …☆1,741Aug 2, 2024Updated last year
- Maturity models help integrate traditionally separate organizational functions, set process improvement goals and priorities, provide gui…☆265Jul 5, 2025Updated 9 months ago
- ☆88Jul 28, 2021Updated 4 years ago
- This is a step-by-step guide to implementing a DevSecOps program for any size organization☆2,039Dec 21, 2024Updated last year
- Checklist for container security - devsecops practices☆1,617Sep 15, 2025Updated 6 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Draw.io libraries for threat modeling diagrams☆788Nov 12, 2020Updated 5 years ago
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆181Dec 11, 2025Updated 4 months ago
- ✨ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The …☆291Feb 5, 2024Updated 2 years ago
- Tool to detect and monitor GitHub org users' public repositories for secrets and sensitive files☆229Mar 30, 2026Updated last week
- This project is about creating and publishing threat model examples.☆431Nov 10, 2021Updated 4 years ago
- Periodic cyber security newsletters that capture the latest news, summaries of conference talks, research, best practices, tools, events,…☆1,296Updated this week
- Watch the latest awesome security talks around the globe☆282Feb 23, 2025Updated last year
- ☆28Oct 2, 2025Updated 6 months ago
- AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE…☆1,218Dec 29, 2025Updated 3 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A Continuous Threat Modeling methodology☆327Jun 24, 2022Updated 3 years ago
- Incident Response Methodologies 2022☆1,113Apr 11, 2025Updated last year
- AI Security Newsletter - A monthly digest of AI security research, insights, reports, upcoming events, and tools & resources☆33Feb 5, 2026Updated 2 months ago
- Sysmon event simulation utility which can be used to simulate the attacks to generate the Sysmon Event logs for testing the EDR detection…☆867Jan 20, 2022Updated 4 years ago
- Threat matrix for CI/CD Pipeline☆762Jul 8, 2024Updated last year
- This publication is a collection of various common attack scenarios on Microsoft Entra ID (formerly known as Azure Active Directory) and …☆2,494Apr 3, 2026Updated last week
- Collection of Event ID ressources useful for Digital Forensics and Incident Response☆644Jun 19, 2024Updated last year
- Documentation and scripts to properly enable Windows event logs.☆688Oct 3, 2025Updated 6 months ago
- ☆15Jan 27, 2022Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Automating situational awareness for cloud penetration tests.☆2,335Mar 24, 2026Updated 2 weeks ago
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,526Jan 12, 2026Updated 3 months ago
- Awesome free cloud native security learning labs. Includes CTF, self-hosted workshops, guided vulnerability labs, and research labs.☆1,930Oct 1, 2025Updated 6 months ago
- kubernetes-for-soc aims to fast-track the learning curve for SOC analysts by enabling them to swiftly grasp the essential concepts and kn…☆56Dec 18, 2023Updated 2 years ago
- MISP Playbooks☆223Oct 14, 2025Updated 5 months ago
- Detect Tactics, Techniques & Combat Threats☆2,275Jan 21, 2026Updated 2 months ago
- A Pythonic framework for threat modeling☆1,119Mar 16, 2026Updated 3 weeks ago
- GOAL: Incident Response Playbooks Mapped to MITRE Attack Tactics and Techniques. [Contributors Friendly]☆1,551Jul 28, 2024Updated last year
- 🛡️ Awesome Cloud Security Resources ⚔️☆2,388Mar 17, 2026Updated 3 weeks ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ☆400Sep 25, 2023Updated 2 years ago
- My cheatsheet notes to pentest AWS infrastructure☆704Oct 17, 2022Updated 3 years ago
- Agile Threat Modeling Toolkit☆740Mar 30, 2026Updated last week
- Automation scripts to deploy Windows Event Forwarding, Sysmon, and custom audit policies in an Active Directory environment.☆487Nov 21, 2024Updated last year
- An AI-powered threat modeling tool that leverages OpenAI's GPT models to generate threat models for a given application based on the STRI…☆1,000Mar 2, 2026Updated last month
- APT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to provide detect APT movements hidden in the …☆1,406Nov 7, 2024Updated last year
- A simple threat modeling tool to help humans to reduce time-to-value when threat modeling☆700Updated this week