adamshostack / conflictmodeling
A place to gather and organize information about using threat modeling frameworks to deal with social conflict in online systems
☆56Updated last year
Alternatives and similar repositories for conflictmodeling:
Users that are interested in conflictmodeling are comparing it to the libraries listed below
- Repository for the Open Information Security Risk Universe☆63Updated 2 years ago
- 🖇️ STRIDE vs. ASVS equivalence table☆75Updated 6 months ago
- ☆63Updated 2 years ago
- Threat Modeling Manifesto☆27Updated 7 months ago
- Vendor Security Model Contract☆97Updated 2 years ago
- A small set of scripts to summarize AWS Security Groups, and generate visualizations of the rules.☆62Updated 4 years ago
- Presentations, training modules, and other education materials from Duo Security's Application Security team.☆73Updated 3 years ago
- ☆82Updated 3 years ago
- Open source security career ladders☆115Updated 2 years ago
- This repository stores content that can be used to design a Rapid Threat Model Prototyping process for a software development group.☆160Updated last year
- Segment's Threat Modeling training for our engineers☆241Updated 3 years ago
- a curated list of useful threat modeling resources☆129Updated 8 months ago
- Desktop variant of OWASP Threat Dragon☆77Updated 3 years ago
- Documentation on the Cyber Defense Matrix☆24Updated last year
- Stakeholder-Specific Vulnerability Categorization☆137Updated this week
- Security Payload Unit Test Repository (SPUTR)☆86Updated last year
- Content for OWASP Summit 2017 site☆128Updated 4 years ago
- A Terraform module for GRR: the distributed incident forensics and response framework☆51Updated 4 years ago
- Project intended to make Attack Maps part of software development by reducing the time it takes to complete them.☆48Updated 8 years ago
- ☆35Updated 3 years ago
- OWASP Cloud Security - Enabling conversations through threat and control stories☆179Updated 6 years ago
- GCP CSPM using Google Sheets☆34Updated 8 months ago
- A MITRE ATT&CK Navigator export for AWS GuardDuty Findings☆137Updated 3 years ago
- OWASP Threat Dragon core files☆28Updated 3 years ago
- Security Monitoring Resolution Categories☆138Updated 3 years ago
- Collection of resources related to the Center for Threat-Informed Defense☆77Updated 9 months ago
- ☆23Updated last year
- Docs: Vulnerability management aggregation of AppSec & OpSec (Tools Listing)☆30Updated last year
- ☆32Updated 2 years ago
- ☆131Updated 11 months ago