An extensive list of resources related to threat modelling. Gotta catch ’em all!
☆49Apr 29, 2026Updated 3 weeks ago
Alternatives and similar repositories for threats
Users that are interested in threats are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A small tool to help developers understand a huge set of security requirements from appsec teams☆47Sep 2, 2022Updated 3 years ago
- NIVA is a simple web application which is intentionally vulnerable to NoSQL injection. The purpose of this project is to facilitate a bet…☆19Nov 21, 2022Updated 3 years ago
- Report on quality of SBOM contents☆26Dec 18, 2024Updated last year
- OWASP Foundation web repository☆24May 11, 2026Updated last week
- This directory focuses exclusively on Threat Modeling Tools—software, code, libraries, or services that automate, guide, or support the d…☆22May 2, 2026Updated 3 weeks ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Pentest utils☆14Oct 8, 2016Updated 9 years ago
- OWASP Foundation web repository☆42Updated this week
- Vulnerabilities, security advisories, exploit codes and proof-of-concept codes.☆10Apr 12, 2026Updated last month
- Generate xBOMs enriched with AI, SaaS, Crypto and more using Static Code Analysis☆30Jan 22, 2026Updated 4 months ago
- EH-Bble☆10Jul 23, 2019Updated 6 years ago
- Threat Modeling Manifesto☆31Jul 18, 2024Updated last year
- Http Security Headers Checker Tool written in PHP Cli + Useful Tips to set Http Security Headers☆10Mar 27, 2021Updated 5 years ago
- ☆19Feb 3, 2026Updated 3 months ago
- Work in progress...☆10Feb 29, 2024Updated 2 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Compilation of commands for hacking tasks and security tools as a bit of everything☆15Apr 23, 2026Updated last month
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆181Dec 11, 2025Updated 5 months ago
- A Network access firewall for Unix like OS and specifically supports Raspberry Pi 3 .☆11Feb 25, 2018Updated 8 years ago
- R.A.Y.D.E.R revolutionizes security testing for generative AI by letting you test chatbots directly through their web interfaces. No API …☆16Mar 16, 2026Updated 2 months ago
- Scripts and One-Liners☆20Jan 31, 2025Updated last year
- InfoSec OpenAI Examples☆19Nov 26, 2023Updated 2 years ago
- Threat Modeling Tool Extension for Penetration Tester (TMTe4PT)☆12Mar 2, 2022Updated 4 years ago
- Damn Vulnerable Browser Extension (DVBE), previously named as Badly Coded Browser Extension (BCBE), is an open-source vulnerable Chrome E…☆33Mar 4, 2025Updated last year
- Simple authentication toolkit for works with Yubikey☆14May 1, 2026Updated 3 weeks ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- The OWASP SAMM Website☆11Apr 21, 2026Updated last month
- Image Payload Creating/Injecting tools☆13Jun 6, 2021Updated 4 years ago
- ☆63Jun 3, 2025Updated 11 months ago
- Write simple security regression tests for your network infrastructure.☆19Jul 4, 2012Updated 13 years ago
- ☆35Dec 10, 2020Updated 5 years ago
- My Wardley Mapping Stuff (see: https://medium.com/wardleymaps)☆13May 3, 2021Updated 5 years ago
- Harness the security superpowers of your cloud asset inventory☆11Sep 22, 2024Updated last year
- Dataset fingerprinting for AIBOM☆16Updated this week
- Penetration Testing with Kali Linux☆22Oct 18, 2019Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆26Aug 31, 2023Updated 2 years ago
- Invadium runs exploit playbooks against vulnerable target applications in an intuitive, reproducible, and well-defined manner.☆11Apr 27, 2023Updated 3 years ago
- Risks and targets for assessing LLMs & LLM vulnerabilities☆34May 27, 2024Updated last year
- This repository stores content that can be used to design a Rapid Threat Model Prototyping process for a software development group.☆165Mar 14, 2023Updated 3 years ago
- ☆10Nov 15, 2023Updated 2 years ago
- Apple Books Highlights Exporter☆11Jul 31, 2024Updated last year
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆41Dec 12, 2023Updated 2 years ago