An extensive list of resources related to threat modelling. Gotta catch ’em all!
☆43Mar 19, 2026Updated this week
Alternatives and similar repositories for threats
Users that are interested in threats are comparing it to the libraries listed below
Sorting:
- A small tool to help developers understand a huge set of security requirements from appsec teams☆46Sep 2, 2022Updated 3 years ago
- NIVA is a simple web application which is intentionally vulnerable to NoSQL injection. The purpose of this project is to facilitate a bet…☆19Nov 21, 2022Updated 3 years ago
- Flowlyt is a security analyzer that scans GitHub Actions workflows to detect malicious patterns, misconfigurations, and secrets exposure,…☆15Updated this week
- Pentest utils☆14Oct 8, 2016Updated 9 years ago
- ☆17Feb 3, 2026Updated last month
- EH-Bble☆10Jul 23, 2019Updated 6 years ago
- Threat Modeling Manifesto☆30Jul 18, 2024Updated last year
- Compilation of commands for hacking tasks and security tools as a bit of everything☆14Jul 3, 2025Updated 8 months ago
- Sample SecOps scripts and Utilities☆12Jun 19, 2024Updated last year
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆181Dec 11, 2025Updated 3 months ago
- R.A.Y.D.E.R revolutionizes security testing for generative AI by letting you test chatbots directly through their web interfaces. No API …☆16Updated this week
- Rust wrapper for posix message queues☆16Jul 5, 2024Updated last year
- Scripts and One-Liners☆20Jan 31, 2025Updated last year
- InfoSec OpenAI Examples☆19Nov 26, 2023Updated 2 years ago
- Get new vulnerability alerts daily straight to your slack channel using GitHub Actions.☆16Jan 15, 2026Updated 2 months ago
- Threat Modeling Tool Extension for Penetration Tester (TMTe4PT)☆12Mar 2, 2022Updated 4 years ago
- Simple authentication toolkit for works with Yubikey☆13Mar 1, 2026Updated 3 weeks ago
- The OWASP SAMM Website☆11Mar 7, 2026Updated 2 weeks ago
- Image Payload Creating/Injecting tools☆13Jun 6, 2021Updated 4 years ago
- ☆63Jun 3, 2025Updated 9 months ago
- Monitor your domains for newly issued certificates and alert to Slack in near-realtime☆10Aug 29, 2022Updated 3 years ago
- Harness the security superpowers of your cloud asset inventory☆11Sep 22, 2024Updated last year
- Dataset fingerprinting for AIBOM☆15Updated this week
- Penetration Testing with Kali Linux☆22Oct 18, 2019Updated 6 years ago
- A simple little Python script that uses Impacket to check if SMBv1 is enabled on a remote host☆16Mar 9, 2017Updated 9 years ago
- Welcome to the Camunda Community Hub! This is the starting point for those interested in joining and contributing to the Camunda Communi…☆22Dec 9, 2025Updated 3 months ago
- ☆26Aug 31, 2023Updated 2 years ago
- Export Pinned Tabs from Arc Browser with one single command☆44Aug 27, 2025Updated 6 months ago
- Invadium runs exploit playbooks against vulnerable target applications in an intuitive, reproducible, and well-defined manner.☆11Apr 27, 2023Updated 2 years ago
- This repository stores content that can be used to design a Rapid Threat Model Prototyping process for a software development group.☆165Mar 14, 2023Updated 3 years ago
- Xiaomi Mi Smart Fan integration for Home Assistant☆10Sep 1, 2020Updated 5 years ago
- Prototype compiler from AWS CloudFormation IaC templates into Logic.☆13Dec 5, 2023Updated 2 years ago
- Apple Books Highlights Exporter☆11Jul 31, 2024Updated last year
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆41Dec 12, 2023Updated 2 years ago
- Code that illustrates some of owlready2 functionality to parse an owl file☆11Feb 7, 2023Updated 3 years ago
- Honeyquest is a cyber security game that asks humans to distinguish neutral, risky, and deceptive payloads. Honeyquest presents participa…☆14Jan 8, 2026Updated 2 months ago
- ☆15Jan 22, 2026Updated 2 months ago
- threatspec - continuous threat modeling, through code☆383Dec 30, 2020Updated 5 years ago
- micromize is a security hardening tool designed to detect and break the post-exploit kill chain for containerized applications, leveragin…☆44Mar 9, 2026Updated last week