Threat Designer is a GenerativeAI application designed to automate and streamline the threat modeling process for secure system design.
☆233Mar 6, 2026Updated this week
Alternatives and similar repositories for threat-designer
Users that are interested in threat-designer are comparing it to the libraries listed below
Sorting:
- Detect drift. Defend cloud.☆36Feb 21, 2026Updated 2 weeks ago
- This JavaScript CLI "undeletes' packages that have been removed from the NPM registry☆29Dec 18, 2025Updated 2 months ago
- ☆28Dec 26, 2025Updated 2 months ago
- Detect AWS usage anomalies in near-real time using OpenSearch Anomaly Detection and CloudTrail for improved cost management and security☆32May 21, 2024Updated last year
- PoC shadow SaaS and insecure credential detection system using a browser extension.☆42Feb 8, 2026Updated last month
- Use Neo4j to help visualize, explore and analyze GCP resources and IAM across your organization☆11Sep 1, 2020Updated 5 years ago
- vBrowser is a secure, containerized browser platform designed for covert web investigations. Originally created to support deep and dark …☆20Feb 24, 2026Updated 2 weeks ago
- A simple threat modeling tool to help humans to reduce time-to-value when threat modeling☆683Updated this week
- Scripts and Lambdas to help with automated deployment of AWS Shield Advanced☆12Feb 11, 2022Updated 4 years ago
- Harness the security superpowers of your cloud asset inventory☆11Sep 22, 2024Updated last year
- This repo contains AI-powered software development patterns showing how to integrate generative AI in different stages of software develo…☆66Mar 2, 2026Updated last week
- ☆51Dec 20, 2025Updated 2 months ago
- Touti Cracker is a cross-platform ethical hacking toolkit for educational purposes, featuring password cracking, WiFi auditing, and rever…☆49Jan 9, 2026Updated 2 months ago
- CRADLE is a collaborative platform for Cyber Threat Intelligence analysts. It streamlines threat investigations with integrated note-taki…☆340Feb 27, 2026Updated last week
- ☆18Jul 30, 2024Updated last year
- Generate a firewall-like report for AWS Security Groups☆14Mar 31, 2023Updated 2 years ago
- Repository to archive GCP Documentation for local use☆16Feb 11, 2025Updated last year
- HoneyZure is a honeypot tool specifically designed for Azure environments, fully provisioned through Terraform. It leverages a Log Analyt…☆17Jun 11, 2024Updated last year
- NextPGP is a elegant and powerful, modern online PGP tool built with Next.js. It can generate keys, manage keyrings, encrypt and decrypt …☆27Feb 7, 2026Updated last month
- Nakamoto is a 2 layer encryption tool to protect your data and your cyptocurrency☆15Nov 13, 2025Updated 3 months ago
- Listener that spawns a new tmux window for each incoming reverse shell + Supports listening on many ports☆60Jul 13, 2025Updated 7 months ago
- This solution supports a bidirectional integration between Security Hub and JIRA. Issues can be either created automatically or manually …☆42Jul 31, 2024Updated last year
- Summaries, transcripts, key points, and other useful insights from AWS re:inforce 2025 talks for those of us who don't have time to watch…☆103Jun 25, 2025Updated 8 months ago
- Neo4j Cybersecurity Demo☆18Mar 16, 2022Updated 3 years ago
- ☆19Sep 15, 2025Updated 5 months ago
- Generates runbooks for GuardDuty findings☆38Jun 24, 2024Updated last year
- AWS Trustline: Check external access on your AWS account☆129Feb 27, 2026Updated last week
- Many AWS Accounts, one email address.☆22Jan 8, 2026Updated 2 months ago
- The Syncfusion Streamlit components library provides Streamlit components that are lightweight, responsive, and compatible across multipl…☆13Jun 17, 2025Updated 8 months ago
- A tool to check the security settings of Github Organizations.☆75Feb 9, 2026Updated last month
- ☆24Jan 22, 2026Updated last month
- Public repository to provide guidance and examples for people to start learning IaC. This repository also contains some open-hack style l…☆23Jun 14, 2023Updated 2 years ago
- An IAM Simulator that outputs detailed explains of how a request was evaluated.☆98Updated this week
- ☆19May 17, 2025Updated 9 months ago
- A full insecure kubernetes application for testing security tools☆93Oct 23, 2025Updated 4 months ago
- ☆96Aug 3, 2025Updated 7 months ago
- BlackCat is a PowerShell module designed to validate the security of Microsoft Azure. It provides a set of functions to identify potentia…☆193Feb 17, 2026Updated 2 weeks ago
- Elevation of MLsec: a threat-modeling card game for machine learning systems☆32Nov 24, 2025Updated 3 months ago
- Eve is a JAMF exploitation toolkit used to interact with locally hosted JAMF servers and those hosted on jamfcloud.com.☆42Sep 16, 2025Updated 5 months ago