Computer Aided Integration of Requirements and Information Security - Server
☆170Jan 1, 2026Updated 2 months ago
Alternatives and similar repositories for cairis
Users that are interested in cairis are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Agile Threat Modeling Toolkit☆737Mar 12, 2026Updated 2 weeks ago
- Microsoft Threat Modeling Template files☆202Nov 28, 2022Updated 3 years ago
- An open source threat modeling tool from OWASP☆1,359Updated this week
- This project is about creating and publishing threat model examples.☆430Nov 10, 2021Updated 4 years ago
- A Pythonic framework for threat modeling☆1,113Mar 16, 2026Updated 2 weeks ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- OWASP Ontology-driven Threat Modelling framework☆40Jul 11, 2023Updated 2 years ago
- 🖇️ equivalence table between OWASP ASVS standard and STRIDE threat modeling methodology.☆76Aug 22, 2024Updated last year
- threatspec - continuous threat modeling, through code☆383Dec 30, 2020Updated 5 years ago
- Gram is Klarna's own threat model diagramming tool☆332Updated this week
- A curated list of threat modeling resources (Books, courses - free and paid, videos, tools, tutorials and workshops to practice on ) for …☆1,731Aug 2, 2024Updated last year
- OWASP Threat Dragon with Gitlab Integration☆27Nov 6, 2017Updated 8 years ago
- An online multiplayer version of the Elevation of Privilege (EoP) threat modeling card game☆160Feb 27, 2026Updated last month
- ☆22Jan 6, 2022Updated 4 years ago
- Draw.io libraries for threat modeling diagrams☆788Nov 12, 2020Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A GitHub workflow to identify employees that have leaked your organization's code☆13May 23, 2023Updated 2 years ago
- ⚖Open Source Toolkit for Conducting Quantitative Risk Assessment Interviews☆39Mar 10, 2024Updated 2 years ago
- ☆76Dec 10, 2025Updated 3 months ago
- A Continuous Threat Modeling methodology☆324Jun 24, 2022Updated 3 years ago
- A Cloud Security Posture Manager or CSPM with a focus on security analysis for the modern cloud stack and a focus on the emerging threat …☆199Aug 29, 2024Updated last year
- Segment's Threat Modeling training for our engineers☆245May 4, 2021Updated 4 years ago
- This repository contains security policies for cnspec maintained by Mondoo and the cnspec community.☆46Jun 6, 2025Updated 9 months ago
- The Elevation of Privilege Threat Modeling Game☆345Jun 20, 2024Updated last year
- Orchestrator managing Erlang containers and routing Erlang Distribution through itself.☆13Dec 19, 2025Updated 3 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Threat Modeling Manifesto☆30Jul 18, 2024Updated last year
- Neo4j Cybersecurity Demo☆18Mar 16, 2022Updated 4 years ago
- Tool for signing and verifying the integrity of CloudFormation templates☆15Feb 16, 2023Updated 3 years ago
- AI-driven Threat modeling-as-a-Code (TaaC-AI)☆161Jun 29, 2025Updated 9 months ago
- ヘッダーベース HTTP API フレームワーク☆14Nov 6, 2025Updated 4 months ago
- A commandline tool that wraps the Archerysec REST API for controlling Archery and executing quick, targeted scans.☆11May 30, 2024Updated last year
- A curated list of threat modeling resources (Books, courses - free and paid, videos, tools, tutorials and workshops to practice on ) for …☆19Mar 13, 2024Updated 2 years ago
- The S2C2F Project is a group working within the OpenSSF's Supply Chain Integrity Working Group formed to further develop and continuously…☆227May 26, 2025Updated 10 months ago
- A framework for understanding the capabilities of automated detection methods at identifying classes of application security vulnerabilit…☆33Mar 21, 2026Updated last week
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Learn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resou…☆10Dec 3, 2020Updated 5 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆14Feb 10, 2022Updated 4 years ago
- An AI-powered threat modeling tool that leverages OpenAI's GPT models to generate threat models for a given application based on the STRI…☆994Mar 2, 2026Updated 3 weeks ago
- A unified DevSecOps Framework that allows you to go from iterative, collaborative Threat Modeling to Application Security Test Orchestrat…☆281Feb 17, 2026Updated last month
- NIST Certified SCAP 1.2 toolkit☆1,685Feb 27, 2026Updated last month
- Component Registry (Corgi) aggregates component data across Red Hat's supported products, managed services, and internal product pipeline…☆17Jan 15, 2025Updated last year
- A terminal plugin to make Kali Linux objectively better - compatible with ohmyzsh☆18Jan 23, 2024Updated 2 years ago