A collection of real-world threat model examples across various technologies, providing practical insights into identifying and mitigating security risks.
☆487Jun 12, 2025Updated 8 months ago
Alternatives and similar repositories for Threat_Model_Examples
Users that are interested in Threat_Model_Examples are comparing it to the libraries listed below
Sorting:
- A curated list of threat modeling resources (Books, courses - free and paid, videos, tools, tutorials and workshops to practice on ) for …☆1,716Aug 2, 2024Updated last year
- Maturity models help integrate traditionally separate organizational functions, set process improvement goals and priorities, provide gui…☆263Jul 5, 2025Updated 7 months ago
- This is a step-by-step guide to implementing a DevSecOps program for any size organization☆2,034Dec 21, 2024Updated last year
- Checklist for container security - devsecops practices☆1,613Sep 15, 2025Updated 5 months ago
- Tool to detect and monitor GitHub org users' public repositories for secrets and sensitive files☆228Updated this week
- Draw.io libraries for threat modeling diagrams☆786Nov 12, 2020Updated 5 years ago
- AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE…☆1,205Dec 29, 2025Updated 2 months ago
- Periodic cyber security newsletters that capture the latest news, summaries of conference talks, research, best practices, tools, events,…☆1,229Feb 5, 2026Updated 3 weeks ago
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆181Dec 11, 2025Updated 2 months ago
- Documentation and scripts to properly enable Windows event logs.☆672Oct 3, 2025Updated 4 months ago
- This publication is a collection of various common attack scenarios on Microsoft Entra ID (formerly known as Azure Active Directory) and …☆2,475Dec 31, 2025Updated 2 months ago
- Incident Response Methodologies 2022☆1,104Apr 11, 2025Updated 10 months ago
- ☆88Jul 28, 2021Updated 4 years ago
- A Continuous Threat Modeling methodology☆324Jun 24, 2022Updated 3 years ago
- Watch the latest awesome security talks around the globe☆280Feb 23, 2025Updated last year
- Collection of Event ID ressources useful for Digital Forensics and Incident Response☆644Jun 19, 2024Updated last year
- This project is about creating and publishing threat model examples.☆428Nov 10, 2021Updated 4 years ago
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,486Jan 12, 2026Updated last month
- ✨ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The …☆289Feb 5, 2024Updated 2 years ago
- Sysmon event simulation utility which can be used to simulate the attacks to generate the Sysmon Event logs for testing the EDR detection…☆864Jan 20, 2022Updated 4 years ago
- Automating situational awareness for cloud penetration tests.☆2,295Feb 21, 2026Updated last week
- kubernetes-for-soc aims to fast-track the learning curve for SOC analysts by enabling them to swiftly grasp the essential concepts and kn…☆56Dec 18, 2023Updated 2 years ago
- Awesome free cloud native security learning labs. Includes CTF, self-hosted workshops, guided vulnerability labs, and research labs.☆1,881Oct 1, 2025Updated 5 months ago
- A web application that assists network defenders, analysts, and researchers in the process of mapping adversary behaviors to the MITRE AT…☆1,208Feb 20, 2026Updated last week
- ☆28Oct 2, 2025Updated 5 months ago
- GOAL: Incident Response Playbooks Mapped to MITRE Attack Tactics and Techniques. [Contributors Friendly]☆1,541Jul 28, 2024Updated last year
- APT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to provide detect APT movements hidden in the …☆1,402Nov 7, 2024Updated last year
- Set of EVTX samples (>270) mapped to MITRE ATT&CK tactic and techniques to measure your SIEM coverage or developed new use cases.☆612Dec 8, 2025Updated 2 months ago
- Agile Threat Modeling Toolkit☆725Nov 20, 2025Updated 3 months ago
- Threat matrix for CI/CD Pipeline☆759Jul 8, 2024Updated last year
- Detect Tactics, Techniques & Combat Threats☆2,264Jan 21, 2026Updated last month
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆68Jun 25, 2025Updated 8 months ago
- This repository contains a collection of cheatsheets I have put together for tools related to pentesting organizations that leverage clou…☆2,803Sep 17, 2024Updated last year
- MISP Playbooks☆222Oct 14, 2025Updated 4 months ago
- ☆401Sep 25, 2023Updated 2 years ago
- A Pythonic framework for threat modeling☆1,108Updated this week
- ☆116Jun 8, 2023Updated 2 years ago
- An Evil OIDC Server☆53Oct 19, 2022Updated 3 years ago
- A Cloud Forensics Powershell module to run threat hunting playbooks on data from Azure and O365☆790Oct 29, 2022Updated 3 years ago