Computer Aided Integration of Requirements and Information Security - Server
☆172Jan 1, 2026Updated 4 months ago
Alternatives and similar repositories for cairis
Users that are interested in cairis are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Agile Threat Modeling Toolkit☆760Apr 8, 2026Updated last month
- Microsoft Threat Modeling Template files☆202Nov 28, 2022Updated 3 years ago
- An open source threat modeling tool from OWASP☆1,453Updated this week
- This project is about creating and publishing threat model examples.☆433Nov 10, 2021Updated 4 years ago
- A Pythonic framework for threat modeling☆1,125May 2, 2026Updated last week
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- OWASP Ontology-driven Threat Modelling framework☆43Jul 11, 2023Updated 2 years ago
- ☆13Sep 25, 2025Updated 7 months ago
- 🖇️ equivalence table between OWASP ASVS standard and STRIDE threat modeling methodology.☆76Aug 22, 2024Updated last year
- threatspec - continuous threat modeling, through code☆383Dec 30, 2020Updated 5 years ago
- Gram is Klarna's own threat model diagramming tool☆334Updated this week
- A curated list of threat modeling resources (Books, courses - free and paid, videos, tools, tutorials and workshops to practice on ) for …☆1,748Aug 2, 2024Updated last year
- An Amazon Alexa skill for checking the status of travel in London☆14Updated this week
- OWASP Threat Dragon with Gitlab Integration☆27Nov 6, 2017Updated 8 years ago
- An online multiplayer version of the Elevation of Privilege (EoP) threat modeling card game☆160Apr 22, 2026Updated 2 weeks ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆22Jan 6, 2022Updated 4 years ago
- Draw.io libraries for threat modeling diagrams☆791Nov 12, 2020Updated 5 years ago
- A GitHub workflow to identify employees that have leaked your organization's code☆13May 23, 2023Updated 2 years ago
- ⚖Open Source Toolkit for Conducting Quantitative Risk Assessment Interviews☆39Mar 10, 2024Updated 2 years ago
- An experimental Velociraptor implementation using cloud infrastructure☆26Dec 2, 2025Updated 5 months ago
- A Cloud Security Posture Manager or CSPM with a focus on security analysis for the modern cloud stack and a focus on the emerging threat …☆201Aug 29, 2024Updated last year
- A Continuous Threat Modeling methodology☆327Jun 24, 2022Updated 3 years ago
- Segment's Threat Modeling training for our engineers☆246May 4, 2021Updated 5 years ago
- This repository contains security policies for cnspec maintained by Mondoo and the cnspec community.☆46Jun 6, 2025Updated 11 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Around the finger, tenderness, wrapped around the world, 24 days ago, ⋅ 3 reading Collect and organize various webshells to do webshell d…☆24Sep 16, 2018Updated 7 years ago
- The Elevation of Privilege Threat Modeling Game☆353Jun 20, 2024Updated last year
- Threat Modeling Manifesto☆31Jul 18, 2024Updated last year
- Repository for the React Native + Socket.io Chat App course☆12Dec 6, 2022Updated 3 years ago
- AI-driven Threat modeling-as-a-Code (TaaC-AI)☆164Jun 29, 2025Updated 10 months ago
- Tool for signing and verifying the integrity of CloudFormation templates☆15Feb 16, 2023Updated 3 years ago
- HTTP Brute Forcer (Java replacement for SP's CrowBar).☆12Apr 20, 2017Updated 9 years ago
- A commandline tool that wraps the Archerysec REST API for controlling Archery and executing quick, targeted scans.☆11May 30, 2024Updated last year
- A curated list of threat modeling resources (Books, courses - free and paid, videos, tools, tutorials and workshops to practice on ) for …☆19Mar 13, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- The S2C2F Project is a group working within the OpenSSF's Supply Chain Integrity Working Group formed to further develop and continuously…☆230May 26, 2025Updated 11 months ago
- Learn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resou…☆10Dec 3, 2020Updated 5 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆14Feb 10, 2022Updated 4 years ago
- An eBPF-based behavioral monitor for AI coding agents.☆133Mar 28, 2026Updated last month
- A unified DevSecOps Framework that allows you to go from iterative, collaborative Threat Modeling to Application Security Test Orchestrat…☆281Feb 17, 2026Updated 2 months ago
- An AI-powered threat modeling tool that leverages OpenAI's GPT models to generate threat models for a given application based on the STRI…☆1,026Apr 27, 2026Updated last week
- NIST Certified SCAP 1.2 toolkit☆1,712Updated this week