Fork Threat Modeling Platform - Community
☆28Oct 10, 2025Updated 6 months ago
Alternatives and similar repositories for fork-community
Users that are interested in fork-community are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This repository hosts several snippets and file related to the BsidesLV 2024 talk about Shadow and Zombie APIs by me☆18Aug 5, 2024Updated last year
- The Primate Pack is a suite of extensions for Caido.☆14Sep 29, 2024Updated last year
- Beer-ISAC Community Resources☆27Jan 22, 2021Updated 5 years ago
- Dragon-GPT uses Chat-GPT, or local LLM, to execute automatic and AI-powered threat modeling analysis on a given OWASP Threat Dragon diagr…☆42Jun 20, 2025Updated 10 months ago
- A risk rating calculation methodology that uses the OWASP Risk Rating Methodology as a basis.☆33Sep 4, 2024Updated last year
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Nuclei is a fast tool for configurable targeted vulnerability scanning based on templates offering massive extensibility and ease of use.☆14Aug 4, 2025Updated 8 months ago
- The CoSAI Risk Map is a framework for identifying, analyzing, and mitigating security risks in Artificial Intelligence systems. As tradit…☆78Updated this week
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆104Dec 13, 2023Updated 2 years ago
- Factor Analysis of Information Risk (FAIR) tool developed in R☆22Mar 23, 2018Updated 8 years ago
- Threat Modeling with ATT&CK defines how to integreate MITRE ATT&CK® into your organization’s existing threat modeling methodology.☆13May 28, 2025Updated 11 months ago
- OWASP Ontology-driven Threat Modelling framework☆43Jul 11, 2023Updated 2 years ago
- ☆35May 13, 2021Updated 4 years ago
- A terminal tool for exploring postgres query plans.☆14Feb 27, 2026Updated 2 months ago
- A Burp Suite extension for Lightning/Aura framework security testing with advanced action management, context editing, and comprehensive …☆63Mar 2, 2026Updated 2 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- The IoT Security Testing Guide (ISTG) provides a comprehensive methodology for penetration tests in the IoT field, offering flexibility t…☆118Jul 29, 2025Updated 9 months ago
- A basic Redis leaderboard demo app written in Go☆12Aug 15, 2023Updated 2 years ago
- A collection of awesome software, learning tutorials, theoretical resources, books and videos, best practices in applied cryptography.☆13Feb 4, 2022Updated 4 years ago
- Sporta is a dynamic app designed for sports enthusiasts who want to connect 🤝, compete 🏆, and play 🏀🎾⚽ with others.☆10Apr 24, 2025Updated last year
- ☆11Oct 13, 2025Updated 6 months ago
- My mpv.net configuration files☆12Jul 10, 2022Updated 3 years ago
- Hyperterm theme based on gruvbox☆17Feb 10, 2017Updated 9 years ago
- ☆15Dec 22, 2015Updated 10 years ago
- StartLeft is an automation tool for generating Threat Models written in the Open Threat Model (OTM) format from a variety of different so…☆54Mar 4, 2026Updated last month
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- SneakPeeker is a tool for finding and removing Canary tokens.☆15Dec 20, 2024Updated last year
- This application contains intentional security vulnerabilities and should never be deployed in production environments or exposed to the …☆16Apr 25, 2025Updated last year
- NetHawk is your network security analysis tool that provides features and alerts via Discord when network attacks occur with score report…☆17Sep 8, 2025Updated 7 months ago
- A full example report☆11Jul 23, 2019Updated 6 years ago
- Resource links (video, slides & code) for my conference talks | presentations | workshops☆21Nov 17, 2025Updated 5 months ago
- hackasat-qualifier-2023-techpapers☆11Jul 17, 2023Updated 2 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆16Jun 12, 2022Updated 3 years ago
- ☆37Apr 16, 2026Updated 2 weeks ago
- Elevate your Security Operations Center's efficiency with Howler, the cutting-edge alert triage platform tailored for today's SOC demands…☆48Updated this week
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Developers Excuses☆11May 28, 2016Updated 9 years ago
- Codeaudit - Modern Python source code security analyzer based on distrust.☆37Apr 25, 2026Updated last week
- Open-source, enterprise-grade threat modeling platform☆75Updated this week
- InfraSight is a modular eBPF-based observability platform for Linux and Kubernetes environments. It provides deep visibility into system …☆36Oct 14, 2025Updated 6 months ago
- Collection of fuzzing payloads and corpus from all around added as sub modules☆15Mar 26, 2026Updated last month
- Automatically attack all file shares within AD network environment. Exploiting weak permissions.☆17Aug 2, 2019Updated 6 years ago
- Prototype-Pollution-Lab to chain the vulnerabilities between multiple accounts.☆13Sep 11, 2021Updated 4 years ago