TalEliyahu / Threat_Model_ExamplesLinks
A collection of real-world threat model examples across various technologies, providing practical insights into identifying and mitigating security risks.
☆468Updated 5 months ago
Alternatives and similar repositories for Threat_Model_Examples
Users that are interested in Threat_Model_Examples are comparing it to the libraries listed below
Sorting:
- This is a companion to the Security Engineer Questions☆207Updated last year
- Gram is Klarna's own threat model diagramming tool☆327Updated last month
- A curated list of Awesome Security Challenges.☆197Updated last year
- Security interview questions with possible explanation for roles in AppSec, Pentesting, Cloud Security, DevSecOps, Network Security and s…☆388Updated 10 months ago
- Maturity models help integrate traditionally separate organizational functions, set process improvement goals and priorities, provide gui…☆257Updated 4 months ago
- Websec interview questions by tib3rius answered☆310Updated 2 years ago
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆212Updated last week
- One Conference 2024☆110Updated last year
- GCPGoat : A Damn Vulnerable GCP Infrastructure☆417Updated last year
- Practical resources for offensive CI/CD security research. Curated the best resources I've seen since 2021.☆556Updated 2 weeks ago
- ✨ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The …☆285Updated last year
- This repo contains IOC, malware and malware analysis associated with Public cloud☆249Updated last year
- A built-to-be-vulnerable API application based on the OWASP top 10 API vulnerabilities. Use c{api}tal to learn, train and exploit API Sec…☆304Updated 3 months ago
- Open source templates you can use to bootstrap your security programs☆878Updated 5 months ago
- A curated list of resources about detecting threats and defending Kubernetes systems.☆397Updated 2 years ago
- Watch the latest awesome security talks around the globe☆277Updated 8 months ago
- ☆419Updated 2 years ago
- Streamline vulnerability patching with CVSS, EPSS, and CISA's Known Exploited Vulnerabilities. Prioritize actions based on real-time thre…☆677Updated last month
- This is a collection of threat detection rules / rules engines that I have come across.☆299Updated last year
- Halberd : Multi-Cloud Agentic Attack Tool☆321Updated last week
- A curated list of annual cyber security reports☆647Updated last week
- The Security Champion Framework provides both a measuring stick and a roadmap generator for Champion Programs.☆111Updated last year
- DevSecOpsGuides☆192Updated 7 months ago
- Awesome curate list of cyber security penetration testing tools for Cloud Security mainly AWS/Azure/Google☆127Updated 4 years ago
- ☆379Updated last year
- ☆88Updated 4 years ago
- Automated Attack Simulation in the Cloud, complete with detection use cases.☆600Updated 11 months ago
- An AI-powered threat modeling tool that leverages OpenAI's GPT models to generate threat models for a given application based on the STRI…☆863Updated 2 weeks ago
- A compilation of Software Supply Chain Security resources including initiatives, standards, regulations, organizations, vendors, tooling,…☆138Updated last year
- Awesome secure by default libraries to help you eliminate bug classes!☆700Updated 6 months ago