CDS Threat Modeling Tool MVP
☆14Mar 5, 2026Updated this week
Alternatives and similar repositories for threat-modeling-tool
Users that are interested in threat-modeling-tool are comparing it to the libraries listed below
Sorting:
- Generative AI-based CyberSecurity-focused Prompt Dataset for Benchmarking Large Language Models☆32Jan 14, 2025Updated last year
- Material for a tutorial on Bayesian analysis of survey data☆12Dec 30, 2025Updated 2 months ago
- System Validation Platform☆12Sep 18, 2025Updated 5 months ago
- A thin async wrapper for SQLAlchemy sessions☆10Sep 13, 2021Updated 4 years ago
- This solution provides the AWS CDK and AWS CloudFormation infrastructure to build an enterprise data mesh with Amazon DataZone.☆10May 7, 2025Updated 10 months ago
- ☆10Oct 29, 2021Updated 4 years ago
- Perform code analysis to detect potentially dangerous vulnerabilities☆13Apr 16, 2024Updated last year
- This repository is an open-source showcase of A2A-based AI agents that implement HTTP Message Signatures for authenticating their request…☆36Sep 25, 2025Updated 5 months ago
- Emoji Code from re:Invent 2023☆10Nov 21, 2023Updated 2 years ago
- Python test runner built in Rust☆19Feb 20, 2026Updated 2 weeks ago
- Bugs Framework☆10Updated this week
- An on screen keyboard for Firefox for those in a kiosk environment.☆12Apr 13, 2021Updated 4 years ago
- A C++ PMU and/or PDC Stream Simulator for IEEE C37.118.2☆12May 21, 2019Updated 6 years ago
- ☆12Feb 10, 2026Updated 3 weeks ago
- AI featured threat modeling and security review action☆46Nov 17, 2024Updated last year
- Easily set Mac Retina display to higher unsupported resolutions☆12Feb 5, 2023Updated 3 years ago
- ☆10Jan 7, 2023Updated 3 years ago
- MultiStep MCP That Returns CVE Information With EPSS Score☆13May 22, 2025Updated 9 months ago
- MCP Registry Demo - A reference implementation on Azure API Center☆12May 17, 2025Updated 9 months ago
- Trivy UI – vulnerability dashboard for Kubernetes clusters☆22Feb 13, 2026Updated 3 weeks ago
- GUI and command line application for downloading large data volumes from PI Historian☆11Nov 8, 2023Updated 2 years ago
- AI Resilience Maturity Model☆25Aug 4, 2024Updated last year
- AIxCC: automated vulnerability repair via LLMs, search, and static analysis☆11Jul 16, 2024Updated last year
- GitHub action to generate a CycloneDX SBOM for .NET☆12Jul 15, 2025Updated 7 months ago
- ☆16Feb 27, 2026Updated last week
- GitHub Actions Security Tester☆12Feb 1, 2023Updated 3 years ago
- Repository for CoSAI workstream 3, AI Risk Governance☆21Feb 18, 2026Updated 2 weeks ago
- @DisCo is a graph based datastore designed to minimize reverse engineering efforts.☆12Jan 21, 2021Updated 5 years ago
- A powerful Burp Suite extension that automatically detects JavaScript URLs from HTTP traffic, scans them using TruffleHog for secrets det…☆31Oct 23, 2025Updated 4 months ago
- 📻 A Mand Mobile project example for Nuxt☆11Jan 4, 2023Updated 3 years ago
- A curated list of 150+ papers and resources on Agentic Security. Based on the survey covering the transition from passive LLMs to autonom…☆28Dec 6, 2025Updated 3 months ago
- ☆14Feb 16, 2023Updated 3 years ago
- Python interpreter for SEL (Schweitzer Engineering Laboratories) CEV (Compressed EVent record) files.☆13Jan 16, 2023Updated 3 years ago
- Command-line utility for iteratively developing pipelines, deploying them at scale, and sharing data and derivatives☆10Jun 15, 2020Updated 5 years ago
- This is a compilation of free resources for the AWS CDK.☆16Jun 2, 2025Updated 9 months ago
- ☆11Aug 29, 2023Updated 2 years ago
- Collection of Semgrep rules for security analysis☆10Mar 30, 2024Updated last year
- A fully client-side chat application with AI capabilities running entirely in your browser. No servers, complete privacy, and persistent …☆15Mar 14, 2025Updated 11 months ago
- Simple packet dissector that detects anomalous DNP3 traffic by analysing its parameters☆15Jan 12, 2016Updated 10 years ago