Threat Designer is a GenerativeAI application designed to automate and streamline the threat modeling process for secure system design.
☆245Mar 26, 2026Updated this week
Alternatives and similar repositories for threat-designer
Users that are interested in threat-designer are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- vBrowser is a secure, containerized browser platform designed for covert web investigations. Originally created to support deep and dark …☆20Feb 24, 2026Updated last month
- 🪓 High-Speed Log Analysis & Forensics Tool - Part of NullSec Toolkit☆73Mar 21, 2026Updated last week
- Detect drift. Defend cloud.☆36Feb 21, 2026Updated last month
- A comprehensive framework and assessment toolkit for measuring and improving Cloud Native security maturity across 8 critical business fu…☆10Jun 24, 2025Updated 9 months ago
- PoC shadow SaaS and insecure credential detection system using a browser extension.☆42Feb 8, 2026Updated last month
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- CRADLE is a collaborative platform for Cyber Threat Intelligence analysts. It streamlines threat investigations with integrated note-taki…☆340Mar 15, 2026Updated 2 weeks ago
- A simple threat modeling tool to help humans to reduce time-to-value when threat modeling☆693Updated this week
- Nakamoto is a 2 layer encryption tool to protect your data and your cyptocurrency☆15Nov 13, 2025Updated 4 months ago
- Summaries, transcripts, key points, and other useful insights from fwd:cloudsec 2025 talks for those of us who don't have time to watch e…☆85Jul 4, 2025Updated 8 months ago
- ☆18Jul 30, 2024Updated last year
- Listener that spawns a new tmux window for each incoming reverse shell + Supports listening on many ports☆60Jul 13, 2025Updated 8 months ago
- PWN is an open security automation framework that aims to stand on the shoulders of security giants, promoting trust and innovation.☆70Updated this week
- Alleycat plugin by devttys0, ported to IDA 8☆11Jan 15, 2025Updated last year
- A tool for folks who `git clone` first and ask questions later☆67Sep 12, 2025Updated 6 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- IDA helper plugin to reverse engineer Objective-C code☆44Jun 12, 2025Updated 9 months ago
- An index of publicly available and open-source threat detection rulesets.☆130Apr 17, 2025Updated 11 months ago
- Summaries, transcripts, key points, and other useful insights from AWS re:inforce 2025 talks for those of us who don't have time to watch…☆103Jun 25, 2025Updated 9 months ago
- ☆20Jan 18, 2022Updated 4 years ago
- ☆52Dec 20, 2025Updated 3 months ago
- Use Neo4j to help visualize, explore and analyze GCP resources and IAM across your organization☆11Sep 1, 2020Updated 5 years ago
- ☆13Nov 5, 2024Updated last year
- ☆28Dec 26, 2025Updated 3 months ago
- ☆22Apr 17, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- An IAM Simulator that outputs detailed explains of how a request was evaluated.☆100Mar 22, 2026Updated last week
- Detect AWS usage anomalies in near-real time using OpenSearch Anomaly Detection and CloudTrail for improved cost management and security☆32May 21, 2024Updated last year
- Touti Cracker is a cross-platform ethical hacking toolkit for educational purposes, featuring password cracking, WiFi auditing, and rever…☆50Jan 9, 2026Updated 2 months ago
- A tool for AWS incident response, that allows for enumeration, acquisition and analysis of data from AWS environments for the purpose of …☆198Jan 6, 2026Updated 2 months ago
- HoneyZure is a honeypot tool specifically designed for Azure environments, fully provisioned through Terraform. It leverages a Log Analyt…☆17Jun 11, 2024Updated last year
- A tool to check the security settings of Github Organizations.☆75Feb 9, 2026Updated last month
- A full insecure kubernetes application for testing security tools☆94Oct 23, 2025Updated 5 months ago
- Minimizing rework for governance activities.☆46Updated this week
- This JavaScript CLI "undeletes' packages that have been removed from the NPM registry☆29Mar 17, 2026Updated last week
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Harness the security superpowers of your cloud asset inventory☆11Sep 22, 2024Updated last year
- ☆10Dec 13, 2023Updated 2 years ago
- SimpleCrypt is a powerful command-line tool designed for securely encrypting and decrypting files and directories using AES-256 encryptio…☆20Mar 22, 2026Updated last week
- Zero Trust Agent☆53Mar 12, 2026Updated 2 weeks ago
- YouShallNotPass brings an added level of execution security to mission-critical CI/CD Systems.☆37Jan 1, 2024Updated 2 years ago
- NextPGP is a elegant and powerful, modern online PGP tool built with Next.js. It can generate keys, manage keyrings, encrypt and decrypt …☆27Mar 20, 2026Updated last week
- AWS Trustline: Check external access on your AWS account☆129Feb 27, 2026Updated last month