TalEliyahu / Threat_Model_Examples
A collection of real-world threat model examples across various technologies, providing practical insights into identifying and mitigating security risks.
☆402Updated last week
Alternatives and similar repositories for Threat_Model_Examples:
Users that are interested in Threat_Model_Examples are comparing it to the libraries listed below
- This is a companion to the Security Engineer Questions☆201Updated last year
- Security interview questions with possible explanation for roles in AppSec, Pentesting, Cloud Security, DevSecOps, Network Security and s…☆311Updated 2 weeks ago
- Watch the latest awesome security talks around the globe☆268Updated 2 years ago
- ✨ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The …☆264Updated 11 months ago
- GCPGoat : A Damn Vulnerable GCP Infrastructure☆365Updated 2 months ago
- Gram is Klarna's own threat model diagramming tool☆291Updated this week
- The Security Champion Framework provides both a measuring stick and a roadmap generator for Champion Programs.☆105Updated last year
- Websec interview questions by tib3rius answered☆305Updated last year
- Maturity models help integrate traditionally separate organizational functions, set process improvement goals and priorities, provide gui…☆221Updated 2 years ago
- ☆404Updated last year
- Segment's Threat Modeling training for our engineers☆239Updated 3 years ago
- A curated list of annual cyber security reports☆411Updated this week
- This is a collection of threat detection rules / rules engines that I have come across.☆277Updated 8 months ago
- Security Champions Playbook v 2.1☆356Updated last year
- A curated list of Awesome Security Challenges.☆178Updated 2 months ago
- 🚨ATTENTION🚨 The Security Stack Mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is k…☆378Updated 9 months ago
- A built-to-be-vulnerable API application based on the OWASP top 10 API vulnerabilities. Use c{api}tal to learn, train and exploit API Sec…☆280Updated 9 months ago
- CNAPPgoat is an open source project designed to modularly provision vulnerable-by-design components in cloud environments.☆271Updated 4 months ago
- Automated Attack Simulation in the Cloud, complete with detection use cases.☆550Updated last month
- Open source templates you can use to bootstrap your security programs☆578Updated 3 weeks ago
- A curated list of resources about detecting threats and defending Kubernetes systems.☆370Updated last year
- Streamline vulnerability patching with CVSS, EPSS, and CISA's Known Exploited Vulnerabilities. Prioritize actions based on real-time thre…☆552Updated 2 months ago
- Awesome curate list of cyber security penetration testing tools for Cloud Security mainly AWS/Azure/Google☆118Updated 3 years ago
- A collection of companies that disclose adversary TTPs after they have been breached☆243Updated 8 months ago
- This repo contains IOC, malware and malware analysis associated with Public cloud☆246Updated 2 months ago
- List of all the Publicly disclosed vulnerabilities of Public Cloud Provider like Amazon Web Services (AWS), Microsoft Azure, Google Cloud…☆358Updated last year
- A curated list of awesome cloud security blogs, podcasts, standards, projects, and examples.☆586Updated last year
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆170Updated last month
- Curated list of open-source & paid Attack Surface Monitoring (ASM) tools.☆366Updated 3 months ago
- ☆169Updated last year