☆92Sep 11, 2025Updated 6 months ago
Alternatives and similar repositories for DFD3
Users that are interested in DFD3 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The Elevation of Privilege Threat Modeling Game☆345Jun 20, 2024Updated last year
- A Continuous Threat Modeling methodology☆324Jun 24, 2022Updated 3 years ago
- An official Nomad task driver plugin for sandboxing workloads using native Linux kernel features☆16Updated this week
- Smart, friendly and helpful chat bot for OWASP Juice Shop☆11Jan 26, 2026Updated last month
- Scripts and outputs for ATLAS data in STIX JSON and ATT&CK Navigator layer formats☆27Feb 6, 2026Updated last month
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Privacy Cards for Software Developers☆54May 17, 2019Updated 6 years ago
- Shostack's 4 Question Frame for Threat Modeling☆165Jan 8, 2026Updated 2 months ago
- Tools to measure the maturity of Enterprise Security Architecture processes☆13Sep 22, 2017Updated 8 years ago
- The Security Champion Framework provides both a measuring stick and a roadmap generator for Champion Programs.☆110Jan 16, 2024Updated 2 years ago
- Swag for the OWASP projects and chapters☆44Jul 18, 2025Updated 8 months ago
- A place to gather and organize information about using threat modeling frameworks to deal with social conflict in online systems☆57Jun 19, 2025Updated 9 months ago
- OWASP Cloud Security - Enabling conversations through threat and control stories☆182Dec 7, 2018Updated 7 years ago
- ☆15Jul 9, 2020Updated 5 years ago
- iknowthis Linux SystemCall Fuzzer☆20Apr 18, 2019Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A curated list of threat modeling resources (Books, courses - free and paid, videos, tools, tutorials and workshops to practice on ) for …☆1,724Aug 2, 2024Updated last year
- ☆42Nov 13, 2025Updated 4 months ago
- OWASP Threat Dragon core files☆11Jan 26, 2026Updated last month
- ☆12Aug 10, 2024Updated last year
- ☆147Mar 16, 2026Updated last week
- OWASP Foundation Web Respository☆19Dec 22, 2025Updated 3 months ago
- This project is about creating and publishing threat model examples.☆430Nov 10, 2021Updated 4 years ago
- Browser agnostic extension that enables pasting into password fields...☆15Jan 12, 2020Updated 6 years ago
- ☆48Feb 22, 2023Updated 3 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Example Suricata rules implementing some of my detection tactics☆22Jan 13, 2023Updated 3 years ago
- Threats Manager Platform Core libraries and SDK☆76Dec 22, 2025Updated 3 months ago
- An auto-scoring capture-the-flag game focusing on TOCTOU vulnerabilities☆21Oct 28, 2020Updated 5 years ago
- ☆22Jan 6, 2022Updated 4 years ago
- ☆102Sep 27, 2024Updated last year
- Speeding up identifying which binaries with a SUID flag may lead to root access☆15Aug 26, 2024Updated last year
- A public version of Unity's internal SSDLC. This is only an example framework, not guaranteed to be in sync with the version currently in…☆175Mar 1, 2022Updated 4 years ago
- Syntax highlighters for Gherkin source☆23Oct 14, 2012Updated 13 years ago
- Short deep dive into Threat Hunting on AWS☆18Oct 15, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A threat modeling tool that implements the Trike v2 methodology in Smalltalk☆16Nov 18, 2019Updated 6 years ago
- Zeek support for Community ID flow hashing.☆36Jul 11, 2023Updated 2 years ago
- Use AI to Scan Your Code from the Command Line for security and code smells. Bring your own keys. Supports OpenAI and Gemini☆176Apr 23, 2025Updated 11 months ago
- Wi-Fi Hacking Workshop☆14Dec 27, 2020Updated 5 years ago
- A collection of Volatility Framework plugins.☆26Aug 29, 2013Updated 12 years ago
- A benchmark for Solid to simulate vaults with social network data.☆11Aug 29, 2025Updated 6 months ago
- Logging plugin to bro to send logs to a Kafka broker☆20Nov 29, 2017Updated 8 years ago