adamshostack / conflictmodelingView external linksLinks
A place to gather and organize information about using threat modeling frameworks to deal with social conflict in online systems
☆57Jun 19, 2025Updated 7 months ago
Alternatives and similar repositories for conflictmodeling
Users that are interested in conflictmodeling are comparing it to the libraries listed below
Sorting:
- PowerShell Memory Pulling script☆19Mar 24, 2015Updated 10 years ago
- A colour-coded radar chart to keep track of technologies in use, whether they are being evaluated, adopted or phased out.☆14Jan 6, 2021Updated 5 years ago
- A simple script to check for insecurely exposed git repositories.☆12Mar 17, 2019Updated 6 years ago
- A simple utility to generate real File and Active Directory activity in lab environments for the purposes of monitoring changes and detec…☆11Dec 4, 2018Updated 7 years ago
- A unified DevSecOps Framework that allows you to go from iterative, collaborative Threat Modeling to Application Security Test Orchestrat…☆280Feb 3, 2026Updated last week
- A Continuous Threat Modeling methodology☆324Jun 24, 2022Updated 3 years ago
- This repository contains various threat hunting tools written in Python and is documented in the series Python Threat Hunting Tools which…☆18Nov 16, 2023Updated 2 years ago
- Systems and Software Security☆16Nov 13, 2025Updated 3 months ago
- This project is about creating and publishing threat model examples.☆427Nov 10, 2021Updated 4 years ago
- A set of Bash scripts that allows you to repeatably collect and compare baseline audit data from Linux and Windows systems☆20Oct 19, 2013Updated 12 years ago
- Zeek support for Community ID flow hashing.☆37Jul 11, 2023Updated 2 years ago
- A utility for password spraying using kerberos from an untrusted/non-domain joined Kali linux host. Useful for user and KDC/DC enumeratio…☆19Oct 28, 2023Updated 2 years ago
- Draw.io libraries for threat modeling diagrams