cds-snc / threat-modeling-toolView external linksLinks
CDS Threat Modeling Tool MVP
☆14Updated this week
Alternatives and similar repositories for threat-modeling-tool
Users that are interested in threat-modeling-tool are comparing it to the libraries listed below
Sorting:
- Generative AI-based CyberSecurity-focused Prompt Dataset for Benchmarking Large Language Models☆31Jan 14, 2025Updated last year
- Material for a tutorial on Bayesian analysis of survey data☆12Dec 30, 2025Updated last month
- This solution provides the AWS CDK and AWS CloudFormation infrastructure to build an enterprise data mesh with Amazon DataZone.☆10May 7, 2025Updated 9 months ago
- A thin async wrapper for SQLAlchemy sessions☆10Sep 13, 2021Updated 4 years ago
- System Validation Platform☆12Sep 18, 2025Updated 4 months ago
- ☆10Oct 29, 2021Updated 4 years ago
- ☆12Updated this week
- This repository is an open-source showcase of A2A-based AI agents that implement HTTP Message Signatures for authenticating their request…☆35Sep 25, 2025Updated 4 months ago
- Emoji Code from re:Invent 2023☆10Nov 21, 2023Updated 2 years ago
- Perform code analysis to detect potentially dangerous vulnerabilities☆13Apr 16, 2024Updated last year
- A C++ PMU and/or PDC Stream Simulator for IEEE C37.118.2☆12May 21, 2019Updated 6 years ago
- An on screen keyboard for Firefox for those in a kiosk environment.☆12Apr 13, 2021Updated 4 years ago
- AI featured threat modeling and security review action☆45Nov 17, 2024Updated last year
- AIxCC: automated vulnerability repair via LLMs, search, and static analysis☆11Jul 16, 2024Updated last year
- Command-line utility for iteratively developing pipelines, deploying them at scale, and sharing data and derivatives☆10Jun 15, 2020Updated 5 years ago
- Python interpreter for SEL (Schweitzer Engineering Laboratories) CEV (Compressed EVent record) files.☆13Jan 16, 2023Updated 3 years ago
- MCP Registry Demo - A reference implementation on Azure API Center☆12May 17, 2025Updated 8 months ago
- 📻 A Mand Mobile project example for Nuxt☆11Jan 4, 2023Updated 3 years ago
- Trivy UI – vulnerability dashboard for Kubernetes clusters☆20Updated this week
- ☆16Feb 2, 2026Updated last week
- MultiStep MCP That Returns CVE Information With EPSS Score☆13May 22, 2025Updated 8 months ago
- GitHub action to generate a CycloneDX SBOM for .NET☆12Jul 15, 2025Updated 7 months ago
- @DisCo is a graph based datastore designed to minimize reverse engineering efforts.☆12Jan 21, 2021Updated 5 years ago
- AI Resilience Maturity Model☆25Aug 4, 2024Updated last year
- ☆14Feb 16, 2023Updated 2 years ago
- GUI and command line application for downloading large data volumes from PI Historian☆11Nov 8, 2023Updated 2 years ago
- A powerful Burp Suite extension that automatically detects JavaScript URLs from HTTP traffic, scans them using TruffleHog for secrets det…☆31Oct 23, 2025Updated 3 months ago
- ☆10Jan 7, 2023Updated 3 years ago
- Repository for CoSAI workstream 3, AI Risk Governance☆21Feb 4, 2026Updated last week
- Cloud security documents and tools to assist with conducting risk assessments that conform to the ICS62443 guidelines☆10Apr 24, 2023Updated 2 years ago
- Easily set Mac Retina display to higher unsupported resolutions☆12Feb 5, 2023Updated 3 years ago
- GitHub Actions Security Tester☆12Feb 1, 2023Updated 3 years ago
- This is a compilation of free resources for the AWS CDK.☆16Jun 2, 2025Updated 8 months ago
- Official implementation of "Poisoning Attacks on Cyber Attack Detectors for Industrial Control Systems" by Moshe Kravchik, Battista Biggi…☆14Mar 22, 2021Updated 4 years ago
- Dont Gamble with Risk☆14Mar 4, 2024Updated last year
- Material from ICS Village talk at DEFCON 25☆12Jul 30, 2018Updated 7 years ago
- A shortlist of core ServiceNow tables.☆15Oct 16, 2023Updated 2 years ago
- Collection of Semgrep rules for security analysis☆10Mar 30, 2024Updated last year
- Subdomain finder☆10Mar 13, 2025Updated 11 months ago