A collection of real-world threat model examples across various technologies, providing practical insights into identifying and mitigating security risks.
☆496Jun 12, 2025Updated 10 months ago
Alternatives and similar repositories for Threat_Model_Examples
Users that are interested in Threat_Model_Examples are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A curated list of threat modeling resources (Books, courses - free and paid, videos, tools, tutorials and workshops to practice on ) for …☆1,748Aug 2, 2024Updated last year
- Maturity models help integrate traditionally separate organizational functions, set process improvement goals and priorities, provide gui…☆266Jul 5, 2025Updated 9 months ago
- ☆88Jul 28, 2021Updated 4 years ago
- This is a step-by-step guide to implementing a DevSecOps program for any size organization☆2,041Dec 21, 2024Updated last year
- Checklist for container security - devsecops practices☆1,618Sep 15, 2025Updated 7 months ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Draw.io libraries for threat modeling diagrams☆792Nov 12, 2020Updated 5 years ago
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆181Dec 11, 2025Updated 4 months ago
- ✨ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The …☆291Feb 5, 2024Updated 2 years ago
- Tool to detect and monitor GitHub org users' public repositories for secrets and sensitive files☆229Apr 17, 2026Updated 2 weeks ago
- This project is about creating and publishing threat model examples.☆433Nov 10, 2021Updated 4 years ago
- Periodic cyber security newsletters that capture the latest news, summaries of conference talks, research, best practices, tools, events,…☆1,298Apr 6, 2026Updated 3 weeks ago
- Discover and watch the latest cybersecurity conference talks. A curated archive of public security conference content.☆282Apr 12, 2026Updated 3 weeks ago
- ☆28Oct 2, 2025Updated 7 months ago
- AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE…☆1,218Dec 29, 2025Updated 4 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A Continuous Threat Modeling methodology☆327Jun 24, 2022Updated 3 years ago
- Incident Response Methodologies 2022☆1,117Apr 11, 2025Updated last year
- Threat matrix for CI/CD Pipeline☆764Jul 8, 2024Updated last year
- Sysmon event simulation utility which can be used to simulate the attacks to generate the Sysmon Event logs for testing the EDR detection…☆869Jan 20, 2022Updated 4 years ago
- This publication is a collection of various common attack scenarios on Microsoft Entra ID (formerly known as Azure Active Directory) and …☆2,513Apr 20, 2026Updated last week
- Collection of Event ID ressources useful for Digital Forensics and Incident Response☆647Jun 19, 2024Updated last year
- Documentation and scripts to properly enable Windows event logs.☆694Oct 3, 2025Updated 6 months ago
- ☆15Jan 27, 2022Updated 4 years ago
- Automating situational awareness for cloud penetration tests.☆2,363Apr 21, 2026Updated last week
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- AI Security Newsletter - A monthly digest of AI security research, insights, reports, upcoming events, and tools & resources☆36Feb 5, 2026Updated 2 months ago
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,541Jan 12, 2026Updated 3 months ago
- Awesome free cloud native security learning labs. Includes CTF, self-hosted workshops, guided vulnerability labs, and research labs.☆1,944Oct 1, 2025Updated 7 months ago
- kubernetes-for-soc aims to fast-track the learning curve for SOC analysts by enabling them to swiftly grasp the essential concepts and kn…☆56Dec 18, 2023Updated 2 years ago
- MISP Playbooks☆225Oct 14, 2025Updated 6 months ago
- Detect Tactics, Techniques & Combat Threats☆2,286Updated this week
- Agile Threat Modeling Toolkit☆759Apr 8, 2026Updated 3 weeks ago
- A Pythonic framework for threat modeling☆1,123Apr 15, 2026Updated 2 weeks ago
- GOAL: Incident Response Playbooks Mapped to MITRE Attack Tactics and Techniques. [Contributors Friendly]☆1,555Jul 28, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- 🛡️ Awesome Cloud Security Resources ⚔️☆2,402Mar 17, 2026Updated last month
- ☆400Sep 25, 2023Updated 2 years ago
- My cheatsheet notes to pentest AWS infrastructure☆705Oct 17, 2022Updated 3 years ago
- Automation scripts to deploy Windows Event Forwarding, Sysmon, and custom audit policies in an Active Directory environment.☆488Nov 21, 2024Updated last year
- APT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to provide detect APT movements hidden in the …☆1,408Nov 7, 2024Updated last year
- An AI-powered threat modeling tool that leverages OpenAI's GPT models to generate threat models for a given application based on the STRI…☆1,020Apr 17, 2026Updated 2 weeks ago
- A simple threat modeling tool to help humans to reduce time-to-value when threat modeling☆708Updated this week