A simple threat modeling tool to help humans to reduce time-to-value when threat modeling
☆683Mar 4, 2026Updated this week
Alternatives and similar repositories for threat-composer
Users that are interested in threat-composer are comparing it to the libraries listed below
Sorting:
- This repository provides sample templates for security playbooks against various scenarios when using Amazon Web Services.☆649Updated this week
- AWS CloudSaga - Simulate security events in AWS☆473Updated this week
- Example AWS Resource control policies to get started or mature your usage of AWS RCPs.☆198Updated this week
- Assisted Log Enabler for AWS - Find AWS resources that are not logging, and turn them on.☆273Mar 1, 2026Updated last week
- Generates runbooks for GuardDuty findings☆38Jun 24, 2024Updated last year
- An AWS tool to help you create a point in time assessment of your AWS account using Prowler.☆592Nov 12, 2025Updated 3 months ago
- Example AWS Service control policies to get started or mature your usage of AWS SCPs.☆285Mar 1, 2026Updated last week
- Example policies demonstrating how to implement a data perimeter on AWS.☆193Mar 1, 2026Updated last week
- AWS Security Analytics Bootstrap enables customers to perform security investigations on AWS service logs by providing an Amazon Athena a…☆272Updated this week
- ASH is an extensible, open source SAST, SCA, and IaC security scanner orchestration engine.☆616Updated this week
- Safer AWS SCP deployments via real-time monitoring☆56Sep 30, 2023Updated 2 years ago
- Automated Security Response on AWS is an add-on solution that works with AWS Security Hub to provide a ready-to-deploy architecture and a…☆465Updated this week
- An AI-powered threat modeling tool that leverages OpenAI's GPT models to generate threat models for a given application based on the STRI…☆991Updated this week
- A Pythonic framework for threat modeling☆1,110Feb 24, 2026Updated last week
- Awesome secure by default libraries to help you eliminate bug classes!☆700Dec 6, 2025Updated 3 months ago
- Crowdsourced list of sensitive IAM Actions☆159Oct 29, 2024Updated last year
- This repository can be used to generate and evaluate findings detected by Amazon GuardDuty☆420Jan 7, 2026Updated 2 months ago
- Granular, Actionable Adversary Emulation for the Cloud☆2,267Mar 1, 2026Updated last week
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆142Jan 2, 2025Updated last year
- A curated list of threat modeling resources (Books, courses - free and paid, videos, tools, tutorials and workshops to practice on ) for …☆1,719Aug 2, 2024Updated last year
- ☆1,050Aug 22, 2025Updated 6 months ago
- A tool for quickly evaluating IAM permissions in AWS.☆1,544Aug 2, 2024Updated last year
- Cloud Commotion intends to cause chaos to simulate security incidents☆146Jun 18, 2024Updated last year
- Bare minimum AWS Security Alerting and Secure by default Configuration☆513May 15, 2025Updated 9 months ago
- ☆117Feb 11, 2026Updated 3 weeks ago
- ☆124May 26, 2025Updated 9 months ago
- Convert cloudtrail data to MITRE ATT&CK Sightings☆82Jul 25, 2022Updated 3 years ago
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆59Sep 7, 2023Updated 2 years ago
- Cloudsplaining is an AWS IAM Security Assessment tool that identifies violations of least privilege and generates a risk-prioritized repo…☆2,185Mar 1, 2026Updated last week
- Agile Threat Modeling Toolkit☆727Nov 20, 2025Updated 3 months ago
- AWS honey token manager☆89Aug 1, 2024Updated last year
- An evolving repository of CloudTrail events with detailed descriptions, MITRE ATT&CK insights, real-world incidents, references and secur…☆174Feb 22, 2026Updated 2 weeks ago
- threatspec - continuous threat modeling, through code☆379Dec 30, 2020Updated 5 years ago
- ☆229Feb 24, 2026Updated last week
- List of known AWS accounts☆257Feb 6, 2026Updated last month
- AWS IAM linting library☆1,110Jan 7, 2026Updated 2 months ago
- ☆381Apr 18, 2024Updated last year
- A collection of documented and undocumented AWS API models☆53Nov 21, 2025Updated 3 months ago
- A repository of breaches of AWS customers☆795Jan 24, 2026Updated last month