Threat-Modeling-Manifesto / threat-modeling-manifesto
Threat Modeling Manifesto
☆28Updated 8 months ago
Alternatives and similar repositories for threat-modeling-manifesto:
Users that are interested in threat-modeling-manifesto are comparing it to the libraries listed below
- OWASP Foundation Web Respository☆31Updated 2 years ago
- 🖇️ STRIDE vs. ASVS equivalence table☆76Updated 7 months ago
- Convert cloudtrail data to MITRE ATT&CK Sightings☆79Updated 2 years ago
- ☆41Updated last month
- ☆63Updated 2 years ago
- ☆35Updated 3 years ago
- Systematic Universal Security Testing Orchestration☆37Updated 3 years ago
- An experimental project using LLM technology to generate security documentation for Open Source Software (OSS) projects☆27Updated last month
- ☆33Updated 3 years ago
- Cloud security tutorials and best practices☆38Updated 2 years ago
- ☆18Updated 3 years ago
- A small tool to help developers understand a huge set of security requirements from appsec teams☆45Updated 2 years ago
- Updated incident response generator for training classes☆43Updated 3 years ago
- StartLeft is an automation tool for generating Threat Models written in the Open Threat Model (OTM) format from a variety of different so…☆50Updated last week
- OWASP Foundation Web Respository☆28Updated 7 months ago
- A small set of scripts to summarize AWS Security Groups, and generate visualizations of the rules.☆62Updated 4 years ago
- Examples on how to maintain security/compliance as code and to automate SecOps using the JupiterOne platform.☆53Updated last year
- ☆14Updated 2 years ago
- InfoSec OpenAI Examples☆19Updated last year
- ☆18Updated 3 years ago
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆58Updated last year
- Presentations, training modules, and other education materials from Duo Security's Application Security team.☆73Updated 3 years ago
- Coalfire AWS RAMP/pak Reference Architecture☆36Updated 7 months ago
- Materials used by Product Management and Product Marketing☆12Updated 6 years ago
- ☆100Updated 2 weeks ago
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆62Updated 9 months ago
- Project intended to make Attack Maps part of software development by reducing the time it takes to complete them.☆48Updated 8 years ago
- A repository for wardley maps related to security topics.☆46Updated 8 years ago
- Global Security Database Tools☆42Updated last year
- Automate vulnerability triage which prioritizes remediation over discovery☆16Updated this week