A simple threat modeling tool to help humans to reduce time-to-value when threat modeling
☆693Mar 27, 2026Updated this week
Alternatives and similar repositories for threat-composer
Users that are interested in threat-composer are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This repository provides sample templates for security playbooks against various scenarios when using Amazon Web Services.☆652Updated this week
- Generates runbooks for GuardDuty findings☆38Jun 24, 2024Updated last year
- AWS CloudSaga - Simulate security events in AWS☆474Updated this week
- AWS Security Analytics Bootstrap enables customers to perform security investigations on AWS service logs by providing an Amazon Athena a…☆272Updated this week
- Example policies demonstrating how to implement a data perimeter on AWS.☆196Mar 19, 2026Updated last week
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ASH is an extensible, open source SAST, SCA, and IaC security scanner orchestration engine.☆623Mar 14, 2026Updated 2 weeks ago
- Assisted Log Enabler for AWS - Find AWS resources that are not logging, and turn them on.☆273Mar 21, 2026Updated last week
- An AWS tool to help you create a point in time assessment of your AWS account using Prowler.☆597Mar 10, 2026Updated 2 weeks ago
- Example AWS Service control policies to get started or mature your usage of AWS SCPs.☆295Mar 17, 2026Updated last week
- Automated Security Response on AWS is an add-on solution that works with AWS Security Hub to provide a ready-to-deploy architecture and a…☆470Updated this week
- Example AWS Resource control policies to get started or mature your usage of AWS RCPs.☆201Mar 17, 2026Updated last week
- A Pythonic framework for threat modeling☆1,113Mar 16, 2026Updated last week
- Safer AWS SCP deployments via real-time monitoring☆56Sep 30, 2023Updated 2 years ago
- This repository can be used to generate and evaluate findings detected by Amazon GuardDuty☆420Jan 7, 2026Updated 2 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A curated list of threat modeling resources (Books, courses - free and paid, videos, tools, tutorials and workshops to practice on ) for …☆1,731Aug 2, 2024Updated last year
- Crowdsourced list of sensitive IAM Actions☆159Oct 29, 2024Updated last year
- An AI-powered threat modeling tool that leverages OpenAI's GPT models to generate threat models for a given application based on the STRI…☆994Mar 2, 2026Updated 3 weeks ago
- ☆1,052Aug 22, 2025Updated 7 months ago
- Granular, Actionable Adversary Emulation for the Cloud☆2,283Mar 12, 2026Updated 2 weeks ago
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆59Sep 7, 2023Updated 2 years ago
- Awesome secure by default libraries to help you eliminate bug classes!☆701Dec 6, 2025Updated 3 months ago
- A tool for quickly evaluating IAM permissions in AWS.☆1,545Aug 2, 2024Updated last year
- Convert cloudtrail data to MITRE ATT&CK Sightings☆82Jul 25, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Cloud Commotion intends to cause chaos to simulate security incidents☆146Jun 18, 2024Updated last year
- Bare minimum AWS Security Alerting and Secure by default Configuration☆514May 15, 2025Updated 10 months ago
- threatspec - continuous threat modeling, through code☆383Dec 30, 2020Updated 5 years ago
- Cloudsplaining is an AWS IAM Security Assessment tool that identifies violations of least privilege and generates a risk-prioritized repo…☆2,197Mar 21, 2026Updated last week
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆142Jan 2, 2025Updated last year
- ☆382Apr 18, 2024Updated last year
- Shostack's 4 Question Frame for Threat Modeling☆166Jan 8, 2026Updated 2 months ago
- CDS Threat Modeling Tool MVP☆15Updated this week
- Agile Threat Modeling Toolkit☆737Mar 12, 2026Updated 2 weeks ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- SCP management tool☆135Oct 23, 2023Updated 2 years ago
- A repository of breaches of AWS customers☆798Mar 11, 2026Updated 2 weeks ago
- List of known AWS accounts☆257Feb 6, 2026Updated last month
- Draw.io libraries for threat modeling diagrams☆788Nov 12, 2020Updated 5 years ago
- AWS honey token manager☆90Aug 1, 2024Updated last year
- ☆117Feb 11, 2026Updated last month
- An evolving repository of CloudTrail events with detailed descriptions, MITRE ATT&CK insights, real-world incidents, references and secur…☆174Mar 11, 2026Updated 2 weeks ago