TalEliyahu / Threat_Model_Examples
A collection of real-world threat model examples across various technologies, providing practical insights into identifying and mitigating security risks.
☆411Updated last month
Alternatives and similar repositories for Threat_Model_Examples:
Users that are interested in Threat_Model_Examples are comparing it to the libraries listed below
- This is a companion to the Security Engineer Questions☆202Updated last year
- Security interview questions with possible explanation for roles in AppSec, Pentesting, Cloud Security, DevSecOps, Network Security and s…☆319Updated last month
- ✨ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The …☆269Updated last year
- The Security Champion Framework provides both a measuring stick and a roadmap generator for Champion Programs.☆107Updated last year
- Watch the latest awesome security talks around the globe☆270Updated 2 years ago
- Maturity models help integrate traditionally separate organizational functions, set process improvement goals and priorities, provide gui…☆224Updated 2 years ago
- A curated list of Awesome Security Challenges.☆178Updated 3 months ago
- GCPGoat : A Damn Vulnerable GCP Infrastructure☆367Updated 3 months ago
- ☆404Updated 2 years ago
- This is a collection of threat detection rules / rules engines that I have come across.☆281Updated 9 months ago
- One Conference 2024☆105Updated 4 months ago
- This repo contains IOC, malware and malware analysis associated with Public cloud☆248Updated 3 months ago
- Websec interview questions by tib3rius answered☆306Updated last year
- Gram is Klarna's own threat model diagramming tool☆319Updated this week
- Purple Team Resources for Enterprise Purple Teaming: An Exploratory Qualitative Study by Xena Olsen.☆640Updated last year
- ☆82Updated 3 years ago
- Awesome curate list of cyber security penetration testing tools for Cloud Security mainly AWS/Azure/Google☆121Updated 3 years ago
- Segment's Threat Modeling training for our engineers☆241Updated 3 years ago
- A collection of companies that disclose adversary TTPs after they have been breached☆244Updated 9 months ago
- Security Champions Playbook v 2.1☆358Updated last year
- A curated list of resources about detecting threats and defending Kubernetes systems.☆373Updated last year
- A full insecure kubernetes application for testing security tools☆66Updated this week
- CNAPPgoat is an open source project designed to modularly provision vulnerable-by-design components in cloud environments.☆273Updated 5 months ago
- 🧮 An online calculator to assess the risk of web vulnerabilities based on OWASP Risk Assessment☆156Updated 3 years ago
- A curated list of annual cyber security reports☆450Updated this week
- A curated list of awesome cloud security blogs, podcasts, standards, projects, and examples.☆592Updated last year
- Vulnerability-Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streaml…☆209Updated this week
- 🚨ATTENTION🚨 The Security Stack Mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is k…☆380Updated 10 months ago
- DevSecOpsGuides☆186Updated last week
- ☆289Updated 6 months ago