Fork Threat Modeling Platform - Community
☆27Oct 10, 2025Updated 5 months ago
Alternatives and similar repositories for fork-community
Users that are interested in fork-community are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This repository hosts several snippets and file related to the BsidesLV 2024 talk about Shadow and Zombie APIs by me☆18Aug 5, 2024Updated last year
- Open-source, enterprise-grade threat modeling platform☆32Updated this week
- The Primate Pack is a suite of extensions for Caido.☆13Sep 29, 2024Updated last year
- HTTP-traceroute in Go☆19Oct 19, 2015Updated 10 years ago
- Dragon-GPT uses Chat-GPT, or local LLM, to execute automatic and AI-powered threat modeling analysis on a given OWASP Threat Dragon diagr…☆41Jun 20, 2025Updated 9 months ago
- The CoSAI Risk Map is a framework for identifying, analyzing, and mitigating security risks in Artificial Intelligence systems. As tradit…☆68Updated this week
- A curated list of Software Component Analysis (SCA) books, courses - free and paid, videos, tools, and tutorials.☆112Nov 26, 2024Updated last year
- This provides a guided step by step walkthrough for threat modeling with MITRE ATT&CK Framework☆30Jan 7, 2026Updated 2 months ago
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆103Dec 13, 2023Updated 2 years ago
- OWASP Ontology-driven Threat Modelling framework☆40Jul 11, 2023Updated 2 years ago
- Factor Analysis of Information Risk (FAIR) tool developed in R☆22Mar 23, 2018Updated 8 years ago
- Burp Suite Configuration Tweak☆13Mar 15, 2024Updated 2 years ago
- ☆35May 13, 2021Updated 4 years ago
- A terminal tool for exploring postgres query plans.☆13Feb 27, 2026Updated 3 weeks ago
- The IoT Security Testing Guide (ISTG) provides a comprehensive methodology for penetration tests in the IoT field, offering flexibility t…☆115Jul 29, 2025Updated 7 months ago
- A basic Redis leaderboard demo app written in Go☆12Aug 15, 2023Updated 2 years ago
- A collection of awesome software, learning tutorials, theoretical resources, books and videos, best practices in applied cryptography.☆12Feb 4, 2022Updated 4 years ago
- AI fun☆27Feb 27, 2025Updated last year
- ☆11Oct 13, 2025Updated 5 months ago
- ☆14Dec 22, 2015Updated 10 years ago
- StartLeft is an automation tool for generating Threat Models written in the Open Threat Model (OTM) format from a variety of different so…☆54Mar 4, 2026Updated 2 weeks ago
- SneakPeeker is a tool for finding and removing Canary tokens.☆15Dec 20, 2024Updated last year
- This application contains intentional security vulnerabilities and should never be deployed in production environments or exposed to the …☆16Apr 25, 2025Updated 10 months ago
- A full example report☆11Jul 23, 2019Updated 6 years ago
- Resource links (video, slides & code) for my conference talks | presentations | workshops☆21Nov 17, 2025Updated 4 months ago
- Embeded Toolchains in opensource way☆17Mar 22, 2023Updated 3 years ago
- ☆14Apr 24, 2023Updated 2 years ago
- The RedStack DB extracted as an Obsidian Vault☆42Dec 25, 2025Updated 2 months ago
- hackasat-qualifier-2023-techpapers☆11Jul 17, 2023Updated 2 years ago
- ☆33Feb 20, 2026Updated last month
- Developers Excuses☆11May 28, 2016Updated 9 years ago
- ☆42Nov 13, 2025Updated 4 months ago
- InfraSight is a modular eBPF-based observability platform for Linux and Kubernetes environments. It provides deep visibility into system …☆35Oct 14, 2025Updated 5 months ago
- Hasher is designed to be a tool that allows you to quickly hash plaintext strings, or compare hashed values with a plaintext locally. Not …☆52Dec 27, 2021Updated 4 years ago
- Collection of fuzzing payloads and corpus from all around added as sub modules☆15May 17, 2025Updated 10 months ago
- ☆13Mar 14, 2026Updated last week
- Automatically attack all file shares within AD network environment. Exploiting weak permissions.☆17Aug 2, 2019Updated 6 years ago
- Prototype-Pollution-Lab to chain the vulnerabilities between multiple accounts.☆13Sep 11, 2021Updated 4 years ago
- GRFICSv3 is a FREE and open source OT security lab with realistic networking and a 3D process simulation for training and learning ICS se…☆92Updated this week