TalEliyahu / Threat_Model_ExamplesLinks
A collection of real-world threat model examples across various technologies, providing practical insights into identifying and mitigating security risks.
☆440Updated last month
Alternatives and similar repositories for Threat_Model_Examples
Users that are interested in Threat_Model_Examples are comparing it to the libraries listed below
Sorting:
- This is a companion to the Security Engineer Questions☆204Updated last year
- GCPGoat : A Damn Vulnerable GCP Infrastructure☆404Updated 9 months ago
- Gram is Klarna's own threat model diagramming tool☆322Updated last week
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆209Updated this week
- Security interview questions with possible explanation for roles in AppSec, Pentesting, Cloud Security, DevSecOps, Network Security and s…☆369Updated 7 months ago
- A curated list of Awesome Security Challenges.☆192Updated 9 months ago
- This repo contains IOC, malware and malware analysis associated with Public cloud☆248Updated 8 months ago
- Watch the latest awesome security talks around the globe☆275Updated 5 months ago
- ✨ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The …☆281Updated last year
- Maturity models help integrate traditionally separate organizational functions, set process improvement goals and priorities, provide gui…☆239Updated last month
- One Conference 2024☆111Updated 10 months ago
- Practical resources for offensive CI/CD security research. Curated the best resources I've seen since 2021.☆534Updated 5 months ago
- A built-to-be-vulnerable API application based on the OWASP top 10 API vulnerabilities. Use c{api}tal to learn, train and exploit API Sec…☆298Updated last year
- ☆417Updated 2 years ago
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆78Updated last year
- A curated list of resources about detecting threats and defending Kubernetes systems.☆387Updated last year
- Websec interview questions by tib3rius answered☆309Updated last year
- Streamline vulnerability patching with CVSS, EPSS, and CISA's Known Exploited Vulnerabilities. Prioritize actions based on real-time thre…☆658Updated 2 weeks ago
- This is a collection of threat detection rules / rules engines that I have come across.☆293Updated last year
- The Security Champion Framework provides both a measuring stick and a roadmap generator for Champion Programs.☆108Updated last year
- Open source templates you can use to bootstrap your security programs☆861Updated 2 months ago
- Playing around with Stratus Red Team (Cloud Attack simulation tool) and SumoLogic☆299Updated 2 years ago
- Security Champions Playbook v 2.1☆376Updated last year
- A collection of GCP IAM privilege escalation methods documented by the Rhino Security Labs team.☆396Updated last year
- OWASP Foundation Web Respository☆97Updated 6 months ago
- A full insecure kubernetes application for testing security tools☆89Updated 3 months ago
- Halberd : Multi-Cloud Agentic Attack Tool☆299Updated 3 weeks ago
- This provides a guided step by step walkthrough for threat modeling with MITRE ATT&CK Framework☆30Updated 5 months ago
- This is a RSS feed collection for all the InfoSec Content Creators☆32Updated last year
- A compilation of Software Supply Chain Security resources including initiatives, standards, regulations, organizations, vendors, tooling,…☆135Updated last year