A collection of real-world threat model examples across various technologies, providing practical insights into identifying and mitigating security risks.
☆503Jun 12, 2025Updated 11 months ago
Alternatives and similar repositories for Threat_Model_Examples
Users that are interested in Threat_Model_Examples are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A curated list of threat modeling resources (Books, courses - free and paid, videos, tools, tutorials and workshops to practice on ) for …☆1,752Aug 2, 2024Updated last year
- Maturity models help integrate traditionally separate organizational functions, set process improvement goals and priorities, provide gui…☆266Jul 5, 2025Updated 10 months ago
- ☆88Jul 28, 2021Updated 4 years ago
- This is a step-by-step guide to implementing a DevSecOps program for any size organization☆2,041Dec 21, 2024Updated last year
- Checklist for container security - devsecops practices☆1,618Sep 15, 2025Updated 8 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Draw.io libraries for threat modeling diagrams☆791Nov 12, 2020Updated 5 years ago
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆181Dec 11, 2025Updated 5 months ago
- ✨ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The …☆292Feb 5, 2024Updated 2 years ago
- Tool to detect and monitor GitHub org users' public repositories for secrets and sensitive files☆230Apr 17, 2026Updated last month
- This project is about creating and publishing threat model examples.☆432Nov 10, 2021Updated 4 years ago
- Periodic cyber security newsletters that capture the latest news, summaries of conference talks, research, best practices, tools, events,…☆1,304Apr 6, 2026Updated last month
- Discover and watch the latest cybersecurity conference talks. A curated archive of public security conference content.☆282Apr 29, 2026Updated 3 weeks ago
- ☆28Oct 2, 2025Updated 7 months ago
- AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE…☆1,219Dec 29, 2025Updated 4 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A Continuous Threat Modeling methodology☆327Jun 24, 2022Updated 3 years ago
- Incident Response Methodologies 2022☆1,119Apr 11, 2025Updated last year
- Threat matrix for CI/CD Pipeline☆768Jul 8, 2024Updated last year
- Sysmon event simulation utility which can be used to simulate the attacks to generate the Sysmon Event logs for testing the EDR detection…☆866Jan 20, 2022Updated 4 years ago
- This publication is a collection of various common attack scenarios on Microsoft Entra ID (formerly known as Azure Active Directory) and …☆2,522Apr 20, 2026Updated last month
- Collection of Event ID ressources useful for Digital Forensics and Incident Response☆652Jun 19, 2024Updated last year
- Documentation and scripts to properly enable Windows event logs.☆704Oct 3, 2025Updated 7 months ago
- ☆15Jan 27, 2022Updated 4 years ago
- Automating situational awareness for cloud penetration tests.☆2,382Apr 21, 2026Updated last month
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- AI Security Newsletter - A monthly digest of AI security research, insights, reports, upcoming events, and tools & resources☆38Updated this week
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,559Jan 12, 2026Updated 4 months ago
- kubernetes-for-soc aims to fast-track the learning curve for SOC analysts by enabling them to swiftly grasp the essential concepts and kn…☆56Dec 18, 2023Updated 2 years ago
- Awesome free cloud native security learning labs. Includes CTF, self-hosted workshops, guided vulnerability labs, and research labs.☆1,965Oct 1, 2025Updated 7 months ago
- MISP Playbooks☆228Oct 14, 2025Updated 7 months ago
- Detect Tactics, Techniques & Combat Threats☆2,290Apr 29, 2026Updated 3 weeks ago
- Agile Threat Modeling Toolkit☆763Apr 8, 2026Updated last month
- A Pythonic framework for threat modeling☆1,125May 2, 2026Updated 2 weeks ago
- GOAL: Incident Response Playbooks Mapped to MITRE Attack Tactics and Techniques. [Contributors Friendly]☆1,566Jul 28, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- 🛡️ Awesome Cloud Security Resources ⚔️☆2,419Mar 17, 2026Updated 2 months ago
- ☆402Sep 25, 2023Updated 2 years ago
- My cheatsheet notes to pentest AWS infrastructure☆708Oct 17, 2022Updated 3 years ago
- Automation scripts to deploy Windows Event Forwarding, Sysmon, and custom audit policies in an Active Directory environment.☆487Nov 21, 2024Updated last year
- APT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to provide detect APT movements hidden in the …☆1,408Nov 7, 2024Updated last year
- An AI-powered threat modeling tool that leverages OpenAI's GPT models to generate threat models for a given application based on the STRI…☆1,039May 11, 2026Updated last week
- A simple threat modeling tool to help humans to reduce time-to-value when threat modeling☆733Updated this week