Fork Threat Modeling Platform - Community
☆27Oct 10, 2025Updated 4 months ago
Alternatives and similar repositories for fork-community
Users that are interested in fork-community are comparing it to the libraries listed below
Sorting:
- This contains 100 days of the notes which i have learned with the internship.☆18Dec 1, 2024Updated last year
- Dragon-GPT uses Chat-GPT, or local LLM, to execute automatic and AI-powered threat modeling analysis on a given OWASP Threat Dragon diagr…☆41Jun 20, 2025Updated 8 months ago
- The Primate Pack is a suite of extensions for Caido.☆13Sep 29, 2024Updated last year
- This repository hosts several snippets and file related to the BsidesLV 2024 talk about Shadow and Zombie APIs by me☆18Aug 5, 2024Updated last year
- Inject shellcode into extra file alignment padding of a PE and change the entry point to point to the shellcode. On execution, the shellc…☆22Oct 29, 2012Updated 13 years ago
- The CoSAI Risk Map is a framework for identifying, analyzing, and mitigating security risks in Artificial Intelligence systems. As tradit…☆60Feb 19, 2026Updated last week
- Beer-ISAC Community Resources☆26Jan 22, 2021Updated 5 years ago
- A risk rating calculation methodology that uses the OWASP Risk Rating Methodology as a basis.☆32Sep 4, 2024Updated last year
- This provides a guided step by step walkthrough for threat modeling with MITRE ATT&CK Framework☆30Jan 7, 2026Updated last month
- OWASP Ontology-driven Threat Modelling framework☆40Jul 11, 2023Updated 2 years ago
- DevOps☆16May 17, 2021Updated 4 years ago
- Replaces all .jpg and .png with a picture of nicolas cage.☆10Jun 10, 2014Updated 11 years ago
- Material for a tutorial on Bayesian analysis of survey data☆12Dec 30, 2025Updated 2 months ago
- A thin async wrapper for SQLAlchemy sessions☆10Sep 13, 2021Updated 4 years ago
- ☆17Feb 20, 2026Updated last week
- Sporta is a dynamic app designed for sports enthusiasts who want to connect 🤝, compete 🏆, and play 🏀🎾⚽ with others.☆10Apr 24, 2025Updated 10 months ago
- This repository contains the code and PCAPS used for the SANS webinar, "Hacking Proprietary Protocols" given on February 23, 2021.☆34Apr 9, 2022Updated 3 years ago
- System Validation Platform☆12Sep 18, 2025Updated 5 months ago
- Tool chains of EasyBC☆10Jun 18, 2024Updated last year
- Automatically generate tests for your website by using LLM models☆17Aug 7, 2023Updated 2 years ago
- ☆12Jul 7, 2014Updated 11 years ago
- Integration of fluent-bit and Splunk using the HTTP Event Collector (Splunk HEC)☆10Oct 16, 2018Updated 7 years ago
- A low-cost remote vital signs monitor for home patients☆12Feb 19, 2026Updated last week
- Opensource repository for DVID V2☆17Jun 3, 2025Updated 9 months ago
- StartLeft is an automation tool for generating Threat Models written in the Open Threat Model (OTM) format from a variety of different so…☆53Nov 25, 2025Updated 3 months ago
- OpenPGP in Python using Sequoia PGP☆18Updated this week
- The IoT Security Testing Guide (ISTG) provides a comprehensive methodology for penetration tests in the IoT field, offering flexibility t…☆114Jul 29, 2025Updated 7 months ago
- ☆13Jan 20, 2017Updated 9 years ago
- A project to convert the default and contrib.humanize template filters from Django to JavaScript☆14Updated this week
- A testing framework and a set of test suites used for testing GCE Images.☆15Feb 24, 2026Updated last week
- ☆19Jul 21, 2025Updated 7 months ago
- Archiving GitHub☆11Aug 5, 2025Updated 6 months ago
- This Repo is under constant update. We will update all the notes while preparing for OSCP. If anyone want to contribute you are most welc…☆11Aug 29, 2019Updated 6 years ago
- GUI and command line application for downloading large data volumes from PI Historian☆11Nov 8, 2023Updated 2 years ago
- Miscellaneous IDA scripts and projects☆15Apr 14, 2021Updated 4 years ago
- Python interpreter for SEL (Schweitzer Engineering Laboratories) CEV (Compressed EVent record) files.☆13Jan 16, 2023Updated 3 years ago
- Naked-eye 3D Effect with tracking.js + three.js☆10Aug 7, 2023Updated 2 years ago
- Various Malware-Related Utilities☆10Aug 4, 2016Updated 9 years ago
- This is a proof of concept exploit which bypasses root detection in Samsung's Knox Messenger. This has been reported to Knox Messenger te…☆15Jan 30, 2020Updated 6 years ago