TalEliyahu / Threat_Model_Examples
A collection of real-world threat model examples across various technologies, providing practical insights into identifying and mitigating security risks.
☆429Updated 2 months ago
Alternatives and similar repositories for Threat_Model_Examples
Users that are interested in Threat_Model_Examples are comparing it to the libraries listed below
Sorting:
- This is a companion to the Security Engineer Questions☆202Updated last year
- GCPGoat : A Damn Vulnerable GCP Infrastructure☆384Updated 6 months ago
- Security interview questions with possible explanation for roles in AppSec, Pentesting, Cloud Security, DevSecOps, Network Security and s…☆348Updated 4 months ago
- ✨ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The …☆278Updated last year
- Watch the latest awesome security talks around the globe☆275Updated 2 months ago
- The Security Champion Framework provides both a measuring stick and a roadmap generator for Champion Programs.☆108Updated last year
- ☆412Updated 2 years ago
- This is a collection of threat detection rules / rules engines that I have come across.☆287Updated last year
- Gram is Klarna's own threat model diagramming tool☆320Updated 2 weeks ago
- Websec interview questions by tib3rius answered☆308Updated last year
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆194Updated this week
- Maturity models help integrate traditionally separate organizational functions, set process improvement goals and priorities, provide gui…☆233Updated last week
- AzureGoat : A Damn Vulnerable Azure Infrastructure☆843Updated 6 months ago
- This repo contains IOC, malware and malware analysis associated with Public cloud☆249Updated 6 months ago
- A curated list of Awesome Security Challenges.☆183Updated 6 months ago
- Segment's Threat Modeling training for our engineers☆243Updated 4 years ago
- Purple Team Resources for Enterprise Purple Teaming: An Exploratory Qualitative Study by Xena Olsen.☆650Updated last year
- Purple Team Exercise Framework☆700Updated last year
- Offensive security and Penetration Testing TTP for Cloud based environment (AWS / Azure / GCP)☆332Updated 2 months ago
- 🧮 An online calculator to assess the risk of web vulnerabilities based on OWASP Risk Assessment☆158Updated 3 years ago
- Automated Attack Simulation in the Cloud, complete with detection use cases.☆567Updated 5 months ago
- A collection of Active Directory, phishing, mobile technology, system, service, web application, and wireless technology weaknesses that …☆244Updated 2 years ago
- A built-to-be-vulnerable API application based on the OWASP top 10 API vulnerabilities. Use c{api}tal to learn, train and exploit API Sec…☆290Updated last year
- This Repo serves as a collection of shared security and penetration testing resources for the cloud.☆267Updated 9 months ago
- One Conference 2024☆109Updated 7 months ago
- ☆292Updated 9 months ago
- Vulnerability-Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streaml…☆272Updated this week
- Playing around with Stratus Red Team (Cloud Attack simulation tool) and SumoLogic☆297Updated 2 years ago
- A collection of companies that disclose adversary TTPs after they have been breached☆243Updated last year
- Open source templates you can use to bootstrap your security programs☆844Updated last month