Threat Modeling Manifesto
☆30Jul 18, 2024Updated last year
Alternatives and similar repositories for threat-modeling-manifesto
Users that are interested in threat-modeling-manifesto are comparing it to the libraries listed below
Sorting:
- OWASP Foundation Web Respository☆22Feb 27, 2026Updated 3 weeks ago
- Web3 Enabler Web3 Enabler XRP for Salesforce enables users to accept XRP on the XRP Ledger in Salesforce.☆22Nov 12, 2025Updated 4 months ago
- Palestra sobre desenvolvimento seguro de imagens e containers para a DockerCon 2021 sala Brasil☆10May 27, 2021Updated 4 years ago
- Agama Mobile App Prototype☆18May 29, 2019Updated 6 years ago
- A documentation and tracking project with the goal of making package management systems more secure.☆51Mar 5, 2021Updated 5 years ago
- A Continuous Threat Modeling methodology☆324Jun 24, 2022Updated 3 years ago
- The Open Security Summit is focused on the collaboration between, Developers and Application Security☆45Jul 9, 2025Updated 8 months ago
- A Rust crate for reading LDtk project files☆12Apr 26, 2021Updated 4 years ago
- This repository services the UNO Cybersecurity capstone (CYBR 4580/8950)☆11Feb 23, 2026Updated 3 weeks ago
- Security Scanning Samples with cnspec, cnquery, and Mondoo Platform☆16Updated this week
- DevSecOps Working Group☆12Sep 24, 2019Updated 6 years ago
- SAMM stands for Software Assurance Maturity Model.☆398May 17, 2022Updated 3 years ago
- Security Workshop | Azure☆10Jul 28, 2020Updated 5 years ago
- ☆23Mar 8, 2026Updated last week
- An extensive list of resources related to threat modelling. Gotta catch ’em all!☆42Mar 12, 2026Updated last week
- Forward EKS CloudWatch k8s audit events to Sysdig secure☆27Aug 14, 2023Updated 2 years ago
- Simple script for testing CVE-2016-2402 and similar flaws☆13Mar 30, 2016Updated 9 years ago
- Manage automation results, like you test it manually☆14Feb 8, 2022Updated 4 years ago
- Automatically parse and tabulate Nessus findings into OpenDocument tables☆11Dec 15, 2015Updated 10 years ago
- Test of http://www.malwaredomainlist.com/hostslist/hosts.txt☆14Updated this week
- A Mesos binding for Clojure☆30Nov 5, 2015Updated 10 years ago
- a curated list of useful threat modeling resources☆147Jun 28, 2024Updated last year
- aws ssm public documents☆12Mar 8, 2026Updated last week
- Code samples related to "Reduce Time to Resolution with Amazon CloudWatch Snapshot Graphs and Alerts” blog post published on the AWS DevO…☆14May 12, 2021Updated 4 years ago
- Contains symbols/icons used in Wardley Maps☆24Aug 14, 2019Updated 6 years ago
- Learn how to get more out of publicly available threat reports to help improve the security posture of your organization! TLP: White Thre…☆15Jun 5, 2023Updated 2 years ago
- Node.js 8 template for OpenFaaS with HTTP via Express.js☆15Sep 25, 2019Updated 6 years ago
- A CLI project wrapping application security testing (AST) APIs☆59Updated this week
- A collection of scripts to look various things up in VERIS data such as VCDB.☆14Apr 27, 2017Updated 8 years ago
- An unofficial python interface to xkcd. https://pypi.python.org/pypi/xkcd/☆23Jan 31, 2024Updated 2 years ago
- Intro to Quantum Computing - quantum optics to algorithms with interactive labs☆26May 22, 2025Updated 9 months ago
- Checks a Citrix StoreFront deployment☆11Mar 18, 2019Updated 7 years ago
- AIL project training materials☆39Feb 24, 2026Updated 3 weeks ago
- A home internet server configuration for the BeagleBone Black, Raspberry Pi or Cubieboard☆10Jun 16, 2014Updated 11 years ago
- PrOfESSOS is our open source implementation for fully automated Evaluation-as-a-Service for SSO. PrOfESSOS introduces a generic approach …☆29Jan 8, 2023Updated 3 years ago
- ☆12Nov 22, 2024Updated last year
- CERTITUDE - A python package to classify malicious URLs☆20May 16, 2022Updated 3 years ago
- Outputs vs. outcomes: what's the different and why does it matter?☆16Apr 14, 2025Updated 11 months ago
- CodeQL and Binary Ninja scripts to accompany the blog post☆11Feb 3, 2023Updated 3 years ago