GitHub action to run Threagile, the agile threat modeling toolkit, on a repo's threagile.yaml file
☆14May 3, 2024Updated last year
Alternatives and similar repositories for run-threagile-action
Users that are interested in run-threagile-action are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The open source version of the AWS Security Hub documentation. To provide feedback or request changes, you can submit a pull request that…☆35Jun 16, 2023Updated 2 years ago
- A commandline tool that wraps the Archerysec REST API for controlling Archery and executing quick, targeted scans.☆11May 30, 2024Updated last year
- Not distributed anymore but allow the existing users of the plugin to use the latest version. Please migrate to:☆11Oct 2, 2024Updated last year
- Security diagnostic quick start guide. Identifying the best measures and establishing specific security procedures for your organization.☆11May 29, 2019Updated 6 years ago
- ☆11Nov 13, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Agile Load Testing☆11Oct 7, 2021Updated 4 years ago
- Code samples for SQL Server Discovery using the Microsoft Assessment and Planning (MAP) toolkit☆11Dec 9, 2020Updated 5 years ago
- ☆12Jun 24, 2024Updated last year
- ☆19Mar 10, 2026Updated 2 weeks ago
- Web interface for monitoring and interacting with Netflow data stored in Silk repositories.☆13Mar 24, 2019Updated 7 years ago
- Code samples for Query relational data in Azure☆17Jun 10, 2020Updated 5 years ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆11Nov 24, 2023Updated 2 years ago
- API to access the Redis database of a BGP Ranking instance.☆17Dec 11, 2017Updated 8 years ago
- Monitor Unused IAM Roles 🎓☆13Apr 30, 2021Updated 4 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- A detailed list of potentially dangerous file extensions☆18Jun 18, 2025Updated 9 months ago
- ☆22Jan 6, 2022Updated 4 years ago
- OWASP Threat Dragon with Gitlab Integration☆27Nov 6, 2017Updated 8 years ago
- a simple powershell wrapper to automate checking a user's access around the network☆13Dec 5, 2023Updated 2 years ago
- ☆23Dec 14, 2020Updated 5 years ago
- Agile Threat Modeling Toolkit☆738Mar 12, 2026Updated 2 weeks ago
- AWS KMS Encryption & Decyption using CLI & Lambda☆11Apr 12, 2021Updated 4 years ago
- Code samples for the Learn module: Remotely monitor and control devices with IoT Hub. The scenario in this example is monitoring a wine c…☆14Dec 12, 2019Updated 6 years ago
- Attack Tree modeling sheet for Dia☆20Oct 9, 2018Updated 7 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Repository for tracking issues with DevOps resource center content: https://docs.microsoft.com/azure/devops/learn/☆14Jul 14, 2021Updated 4 years ago
- Powershell Scripts to automatically deploy an image of a prebuilt VM (up-to-date and with pre-deployed tools and apps) to every region yo…☆20Jun 27, 2023Updated 2 years ago
- Supports RSS feed for monthly Guest OS Updates☆16Mar 1, 2026Updated 3 weeks ago
- OWASP Foundation Web Respository☆20Oct 8, 2025Updated 5 months ago
- Find and list Access Keys older than certain date☆13Jan 27, 2018Updated 8 years ago
- This is the GitHub repository for the technical product documentation for Machine Learning Server. See the README.md file for more. This…☆18Nov 22, 2024Updated last year
- CERTITUDE - A python package to classify malicious URLs☆20May 16, 2022Updated 3 years ago
- Mastering Azure Security, published by Packt☆15Oct 28, 2022Updated 3 years ago
- A reimplementation of the EtherApe style display for OS X. Note that this is not a fork of EtherApe. Written in a kinder, gentler, age …☆21Dec 3, 2018Updated 7 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ReverseDSC Orchestrator for ActiveDirectory☆21Jun 12, 2023Updated 2 years ago
- retire.js has a new home☆19May 31, 2015Updated 10 years ago
- Automation ☁️AWS Security 👮- Incident Response using Lambda⚡️to prevent credential exfiltration☆17Apr 9, 2021Updated 4 years ago
- devops-playground: Pocs and fun with automation and cloud.☆21Mar 22, 2026Updated last week
- Code samples and resources for learn module "Troubleshoot inbound network connectivity for Azure Load Balancer"☆15Nov 30, 2023Updated 2 years ago
- a azure monitor workbook for LogicApps☆17Apr 10, 2020Updated 5 years ago
- Additional Resources to improve Customer Experience with Azure Advanced Threat Protection☆22Jun 12, 2023Updated 2 years ago