bvoris / mitreattackthreatmodelingView external linksLinks
This provides a guided step by step walkthrough for threat modeling with MITRE ATT&CK Framework
☆30Jan 7, 2026Updated last month
Alternatives and similar repositories for mitreattackthreatmodeling
Users that are interested in mitreattackthreatmodeling are comparing it to the libraries listed below
Sorting:
- This is the GitHub repo of the OpenChain SBOM Study Group☆12Aug 6, 2025Updated 6 months ago
- ☆17Aug 27, 2022Updated 3 years ago
- buldDNS: A DNS scanner for large-scale measurement☆21Jan 22, 2026Updated 3 weeks ago
- Máquina virtual para investigaciones en fuentes abiertas OSINT☆17Oct 4, 2024Updated last year
- Contains All tools i Use For Red Team OPs in Windows Environment. NOTE: I am not the Creator Of these tools. These are the tools i use.☆19Aug 11, 2022Updated 3 years ago
- SMB password sprayer☆21Jan 19, 2019Updated 7 years ago
- ☆27Jan 27, 2022Updated 4 years ago
- Sub-domains enumeration framework☆27Nov 26, 2017Updated 8 years ago
- A Firefox Extension to track postMessage usage (url, domain and stack) both by logging using CORS and also visually as an extension-icon☆27Dec 9, 2024Updated last year
- A vulnerable environment for exploring common GCP misconfigurations and vulnerabilities☆32Nov 12, 2025Updated 3 months ago
- ☆28Apr 22, 2025Updated 9 months ago
- Remove duplicate URLs by retaining only the unique combinations of hostname, path, and parameter names☆40May 5, 2024Updated last year
- Collection of scripts/resources/ideas for attack surface reduction and additional logging to enable better threat hunting on Windows endp…☆38Apr 5, 2024Updated last year
- A complete system to deploy functional Honeypots to all infrastructures that needs to be notified when something anomalous occur☆10Feb 8, 2022Updated 4 years ago
- Hunt SSL Certificates for interesting keywords on major cloud service providers / internet☆40Nov 20, 2025Updated 2 months ago
- User Feedback Space of #MitreAssistant☆38May 19, 2023Updated 2 years ago
- ☆11Feb 9, 2026Updated last week
- A security assessment tool for Hitachi Vantara's Pentaho Business Analytics platform.☆14Oct 31, 2021Updated 4 years ago
- A collection of powershell scripts that are designed to be ran from a Microsoft Defender for Endpoint Live Response terminal, utilizing o…☆12Apr 26, 2023Updated 2 years ago
- ☆12Feb 16, 2017Updated 9 years ago
- This repository stores content that can be used to design a Rapid Threat Model Prototyping process for a software development group.☆165Mar 14, 2023Updated 2 years ago
- Nmapurls parses Nmap xml reports from either piped input or command line arg and outputs a list of http(s) URL's to be used in an automat…☆43Jun 15, 2025Updated 8 months ago
- AI featured threat modeling and security review action☆45Nov 17, 2024Updated last year
- ☆13Mar 1, 2024Updated last year
- Repo de préparation à la certification AZ-900 "Azure Fundamentals"☆11Jun 17, 2024Updated last year
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- Kubernetes Master Class: A Seamless Approach to Rancher & Kubernetes Upgrades☆11May 30, 2022Updated 3 years ago
- ☆13Aug 17, 2020Updated 5 years ago
- [MIRROR] Templates and scripts to provide Windows and Linux machines with packer and vagrant☆10May 10, 2025Updated 9 months ago
- Payloads for the Hak5 Bash Bunny☆13May 23, 2019Updated 6 years ago
- Movie Streaming Platform☆18Feb 9, 2026Updated last week
- ☆13Feb 18, 2022Updated 3 years ago
- Misc stuff from internet☆12Nov 5, 2025Updated 3 months ago
- SSE to Stdio MCP Proxy Server☆18Jun 9, 2025Updated 8 months ago
- ☆51Jun 13, 2024Updated last year
- linux kernel overlay☆11Updated this week
- Mass Assigner is a simple tool made to probe for mass assignment vulnerability through JSON field modification in HTTP requests☆15Jun 22, 2024Updated last year
- Threat Modelling Assets (STRIDE, DREAD, etc. cheat sheets)☆13Apr 16, 2020Updated 5 years ago
- ☆20Jan 12, 2022Updated 4 years ago