☆91Sep 11, 2025Updated 5 months ago
Alternatives and similar repositories for DFD3
Users that are interested in DFD3 are comparing it to the libraries listed below
Sorting:
- OWASP Foundation Web Respository☆22Updated this week
- The Elevation of Privilege Threat Modeling Game☆343Jun 20, 2024Updated last year
- Project to Support The Hunter's Framework (THF)☆11Apr 16, 2024Updated last year
- Open source incident management and response platform.☆14Mar 16, 2018Updated 7 years ago
- Privacy Cards for Software Developers☆54May 17, 2019Updated 6 years ago
- An official Nomad task driver plugin for sandboxing workloads using native Linux kernel features☆16Jan 7, 2026Updated last month
- Short deep dive into Threat Hunting on AWS☆17Oct 15, 2023Updated 2 years ago
- A catalog of services that can be publicly exposed within different cloud providers.☆14Aug 30, 2024Updated last year
- A place to gather and organize information about using threat modeling frameworks to deal with social conflict in online systems☆57Jun 19, 2025Updated 8 months ago
- A Continuous Threat Modeling methodology☆324Jun 24, 2022Updated 3 years ago
- Shostack's 4 Question Frame for Threat Modeling☆164Jan 8, 2026Updated last month
- A Pythonic framework for threat modeling☆1,110Feb 24, 2026Updated last week
- This repository contains various threat hunting tools written in Python and is documented in the series Python Threat Hunting Tools which…☆18Nov 16, 2023Updated 2 years ago
- Web3 Enabler Web3 Enabler XRP for Salesforce enables users to accept XRP on the XRP Ledger in Salesforce.☆22Nov 12, 2025Updated 3 months ago
- Zeek support for Community ID flow hashing.☆36Jul 11, 2023Updated 2 years ago
- iknowthis Linux SystemCall Fuzzer☆20Apr 18, 2019Updated 6 years ago
- ☆20Oct 17, 2021Updated 4 years ago
- OWASP Foundation web repository☆35Feb 25, 2026Updated last week
- Official documentation for TheHive Project applications☆21Sep 29, 2023Updated 2 years ago
- A library and a tool for converting audit logs to XML and JSON☆46Jan 19, 2018Updated 8 years ago
- Python tool for bulk PDF feature extraction. This tool is a prototype.☆25Jan 9, 2017Updated 9 years ago
- OWASP Amass Docker Compose for setting up a full instance of the infrastructure☆53Jan 30, 2026Updated last month
- Cybersecurity Architects Handbook, published by Packt☆27Mar 27, 2024Updated last year
- Event Logging is an XML Schema for describing the auditable events generated by computer systems, hardware devices and access control sys…☆25Apr 24, 2025Updated 10 months ago
- read the docs version of risk management☆27Mar 6, 2023Updated 2 years ago
- The Security Champion Framework provides both a measuring stick and a roadmap generator for Champion Programs.☆110Jan 16, 2024Updated 2 years ago
- ☆43Aug 27, 2025Updated 6 months ago
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆181Dec 11, 2025Updated 2 months ago
- This project is about creating and publishing threat model examples.☆429Nov 10, 2021Updated 4 years ago
- key-value in-memory database server☆13Jan 20, 2023Updated 3 years ago
- OpenConext SAML 2.0 IdP/SP Gateway☆17Updated this week
- Use AI to Scan Your Code from the Command Line for security and code smells. Bring your own keys. Supports OpenAI and Gemini☆176Apr 23, 2025Updated 10 months ago
- ☆144Updated this week
- Implementations of EIP message routing patterns☆42Feb 17, 2026Updated 2 weeks ago
- ☆42Nov 13, 2025Updated 3 months ago
- Count distinct contributor of Snyk watched repos across several SCM☆32Jan 21, 2026Updated last month
- An open-source listing of cybersecurity technology mapped to the NIST Cybersecurity Framework (CSF)☆127Jul 14, 2024Updated last year
- Draw.io libraries for threat modeling diagrams☆786Nov 12, 2020Updated 5 years ago
- 🤖 A GitHub action that leverages fabric patterns through an agent-based approach☆34Jan 4, 2025Updated last year