A place to gather and organize information about using threat modeling frameworks to deal with social conflict in online systems
☆57Jun 19, 2025Updated 9 months ago
Alternatives and similar repositories for conflictmodeling
Users that are interested in conflictmodeling are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A colour-coded radar chart to keep track of technologies in use, whether they are being evaluated, adopted or phased out.☆14Jan 6, 2021Updated 5 years ago
- PowerShell Memory Pulling script☆19Mar 24, 2015Updated 11 years ago
- Network Defender Toolkit☆18Jun 11, 2013Updated 12 years ago
- A completely unsupported set of scripts used in SANS FOR572, Advanced Network Forensics and Analysis☆28Aug 6, 2025Updated 7 months ago
- This project is about creating and publishing threat model examples.☆430Nov 10, 2021Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A simple script to check for insecurely exposed git repositories.☆12Mar 17, 2019Updated 7 years ago
- Draw.io libraries for threat modeling diagrams☆788Nov 12, 2020Updated 5 years ago
- Munk - Visualize Splunk Architecture in Maltego☆13Sep 19, 2014Updated 11 years ago
- A unified DevSecOps Framework that allows you to go from iterative, collaborative Threat Modeling to Application Security Test Orchestrat…☆281Feb 17, 2026Updated last month
- A simple utility to generate real File and Active Directory activity in lab environments for the purposes of monitoring changes and detec…☆11Dec 4, 2018Updated 7 years ago
- A commandline tool that wraps the Archerysec REST API for controlling Archery and executing quick, targeted scans.☆11May 30, 2024Updated last year
- A Continuous Threat Modeling methodology☆324Jun 24, 2022Updated 3 years ago
- The Elevation of Privilege Threat Modeling Game☆345Jun 20, 2024Updated last year
- Vendor Security Model Contract☆97Jul 3, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A utility for password spraying using kerberos from an untrusted/non-domain joined Kali linux host. Useful for user and KDC/DC enumeratio…☆19Oct 28, 2023Updated 2 years ago
- Attack Tree modeling sheet for Dia☆20Oct 9, 2018Updated 7 years ago
- Provides content useful for IriusRisk threat modelling, including templates, API scripts, libraries and more.☆16Feb 10, 2026Updated last month
- Accompanying PowerShell Modules for DevSec Defense Presentation☆30Apr 15, 2018Updated 7 years ago
- A simple web app that helps developers understand the ASVS requirements. Now supporting ASVS 5.0☆164Nov 25, 2025Updated 4 months ago
- A Pythonic framework for threat modeling☆1,113Mar 16, 2026Updated last week
- GitHub action to run Threagile, the agile threat modeling toolkit, on a repo's threagile.yaml file☆14May 3, 2024Updated last year
- Notes and reference for ongoing forecasting.☆16Mar 24, 2022Updated 4 years ago
- OWASP Ontology-driven Threat Modelling framework☆40Jul 11, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Zero-overhead destructors in C☆10Sep 18, 2018Updated 7 years ago
- PowerShell script to get domain mail info and control status such as MX, SPF, DKIM, DMARC and StartTLS.☆12May 20, 2025Updated 10 months ago
- The Software Parts (SParts) lab delivers a Sawtooth-based ledger that provides both accountability and access to the open source componen…☆12Feb 20, 2020Updated 6 years ago
- experimental threat modeling tools☆14Oct 7, 2022Updated 3 years ago
- A vulnerability assessment tool for system models☆13Oct 1, 2021Updated 4 years ago
- Expand CIDRs or wrangle a list of IPs back to its smallest CIDR blocks possible☆10Apr 5, 2020Updated 5 years ago
- Speeding up identifying which binaries with a SUID flag may lead to root access☆15Aug 26, 2024Updated last year
- Nixpkgs based build tools for declarative Python packages [maintainer=@datakurre]☆13Sep 21, 2022Updated 3 years ago
- CTF website frontend for SecGen☆21Aug 11, 2017Updated 8 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ARCHIVED Directory of Open Access Journals Client☆11May 10, 2022Updated 3 years ago
- threatspec - continuous threat modeling, through code☆383Dec 30, 2020Updated 5 years ago
- Wi-Fi Hacking Workshop☆14Dec 27, 2020Updated 5 years ago
- Spacehuhn Wiki Source☆13Apr 27, 2023Updated 2 years ago
- Use PyScript in mkdocs☆18May 17, 2024Updated last year
- source for my homepage and blog☆14Mar 18, 2026Updated last week
- ☆17Feb 11, 2025Updated last year