TalEliyahu / Threat_Model_Examples
A collection of real-world threat model examples across various technologies, providing practical insights into identifying and mitigating security risks.
☆422Updated 3 weeks ago
Alternatives and similar repositories for Threat_Model_Examples:
Users that are interested in Threat_Model_Examples are comparing it to the libraries listed below
- This is a companion to the Security Engineer Questions☆202Updated last year
- Watch the latest awesome security talks around the globe☆272Updated last month
- Security interview questions with possible explanation for roles in AppSec, Pentesting, Cloud Security, DevSecOps, Network Security and s…☆331Updated 2 months ago
- ✨ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The …☆273Updated last year
- A curated list of Awesome Security Challenges.☆179Updated 4 months ago
- Websec interview questions by tib3rius answered☆307Updated last year
- GCPGoat : A Damn Vulnerable GCP Infrastructure☆379Updated 4 months ago
- This is a collection of threat detection rules / rules engines that I have come across.☆283Updated 10 months ago
- ☆406Updated 2 years ago
- Security Champions Playbook v 2.1☆360Updated last year
- Purple Team Resources for Enterprise Purple Teaming: An Exploratory Qualitative Study by Xena Olsen.☆645Updated last year
- Maturity models help integrate traditionally separate organizational functions, set process improvement goals and priorities, provide gui…☆225Updated this week
- A curated list of annual cyber security reports☆482Updated this week
- DevSecOpsGuides☆187Updated last week
- Gram is Klarna's own threat model diagramming tool☆319Updated last week
- The Security Champion Framework provides both a measuring stick and a roadmap generator for Champion Programs.☆107Updated last year
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆174Updated this week
- This repo contains IOC, malware and malware analysis associated with Public cloud☆249Updated 4 months ago
- A collection of companies that disclose adversary TTPs after they have been breached☆244Updated 11 months ago
- A curated list of resources about detecting threats and defending Kubernetes systems.☆376Updated last year
- Segment's Threat Modeling training for our engineers☆242Updated 3 years ago
- One Conference 2024☆108Updated 5 months ago
- practical toolkit for cybersecurity and IT professionals. It features a detailed Linux cheatsheet for incident response☆394Updated last year
- Secrets scanner that understands code☆188Updated last year
- ☆85Updated 3 years ago
- A built-to-be-vulnerable API application based on the OWASP top 10 API vulnerabilities. Use c{api}tal to learn, train and exploit API Sec…☆285Updated 11 months ago
- List of all the Publicly disclosed vulnerabilities of Public Cloud Provider like Amazon Web Services (AWS), Microsoft Azure, Google Cloud…☆359Updated last year
- A tool for standing up (and tearing down!) purposefully insecure cloud infrastructure☆687Updated last year
- A collection of GCP IAM privilege escalation methods documented by the Rhino Security Labs team.☆376Updated 11 months ago
- ☆290Updated 7 months ago