TalEliyahu / Threat_Model_Examples
A collection of real-world threat model examples across various technologies, providing practical insights into identifying and mitigating security risks.
☆428Updated last month
Alternatives and similar repositories for Threat_Model_Examples:
Users that are interested in Threat_Model_Examples are comparing it to the libraries listed below
- This is a companion to the Security Engineer Questions☆201Updated last year
- Security interview questions with possible explanation for roles in AppSec, Pentesting, Cloud Security, DevSecOps, Network Security and s…☆337Updated 3 months ago
- ✨ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The …☆276Updated last year
- Watch the latest awesome security talks around the globe☆274Updated 2 months ago
- ☆407Updated 2 years ago
- Websec interview questions by tib3rius answered☆307Updated last year
- This repo contains IOC, malware and malware analysis associated with Public cloud☆249Updated 5 months ago
- Segment's Threat Modeling training for our engineers☆243Updated 3 years ago
- The Security Champion Framework provides both a measuring stick and a roadmap generator for Champion Programs.☆107Updated last year
- Maturity models help integrate traditionally separate organizational functions, set process improvement goals and priorities, provide gui…☆228Updated last month
- Security Champions Playbook v 2.1☆365Updated last year
- GCPGoat : A Damn Vulnerable GCP Infrastructure☆384Updated 5 months ago
- A curated list of Awesome Security Challenges.☆180Updated 5 months ago
- Purple Team Exercise Framework☆696Updated last year
- Purple Team Resources for Enterprise Purple Teaming: An Exploratory Qualitative Study by Xena Olsen.☆649Updated last year
- 🧮 An online calculator to assess the risk of web vulnerabilities based on OWASP Risk Assessment☆158Updated 3 years ago
- Awesome curate list of cyber security penetration testing tools for Cloud Security mainly AWS/Azure/Google☆123Updated 4 years ago
- Gram is Klarna's own threat model diagramming tool☆320Updated last month
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆194Updated this week
- Threat matrix for CI/CD Pipeline☆750Updated 9 months ago
- DevSecOpsGuides☆185Updated 2 weeks ago
- Automated Attack Simulation in the Cloud, complete with detection use cases.☆562Updated 4 months ago
- This is a collection of threat detection rules / rules engines that I have come across.☆285Updated 11 months ago
- Playing around with Stratus Red Team (Cloud Attack simulation tool) and SumoLogic☆292Updated 2 years ago
- A collection of GCP IAM privilege escalation methods documented by the Rhino Security Labs team.☆380Updated last year
- Awesome free cloud native security learning labs. Includes CTF, self-hosted workshops, guided vulnerability labs, and research labs.☆1,617Updated 5 months ago
- A curated list of resources about detecting threats and defending Kubernetes systems.☆376Updated last year
- ☆291Updated 8 months ago
- ☆87Updated 3 years ago
- One Conference 2024☆109Updated 6 months ago