freedomofpress / threat-modelingLinks
experimental threat modeling tools
☆14Updated 3 years ago
Alternatives and similar repositories for threat-modeling
Users that are interested in threat-modeling are comparing it to the libraries listed below
Sorting:
- Rumble Network Discovery API☆17Updated last year
- Command line utility for parsing certificates☆67Updated 4 years ago
- A low/zero interaction ssh authentication logging honeypot☆25Updated last week
- A curated threat modeling library collection☆24Updated 2 years ago
- Welcome to OpenDevSecOps! Our mission is to deliver highly-resilient, readily-available and free defensive and offensive devops security …☆21Updated 6 years ago
- D4 core software (server and sample sensor client)☆42Updated 2 years ago
- NIST OSCAL SDK and CLI☆38Updated 5 years ago
- A starter-kit for a source-controlled, CLI-based osquery management workflow.☆30Updated 7 years ago
- Decision trees generated via Graphviz to inform pragmatic threat modelling.☆11Updated 5 years ago
- Collect, curate, and communicate relevant security metrics for open source projects.☆63Updated last year
- A Java library for programmatically calculating OWASP Risk Rating scores☆19Updated 2 years ago
- Golang-based subdomain miner leveraging certificate transparency logs☆74Updated 2 years ago
- Core incident handling plugins for aws_ir cli, incident pony, and more.☆21Updated 7 years ago
- Script to check ModSecurity rules agains some WAF☆12Updated 7 years ago
- A monitoring tool for certificate transparency of ProtonMail's SSL/TLS certificates☆51Updated 7 years ago
- OWASP Threat Dragon with Gitlab Integration☆27Updated 8 years ago
- Qubes OS DevOps automation☆62Updated last year
- A python wrapper around https://cve.circl.lu.☆55Updated 7 months ago
- Provide a shell like interface by utilizing osquery's distributed API☆82Updated 5 years ago
- A library and a tool for converting audit logs to XML and JSON☆46Updated 7 years ago
- ☆22Updated 7 years ago
- rxtls is a hyper-optimized, per-core Certificate Transparency (CT) log processor built for one purpose: to extract and process 100,000+ X…☆55Updated last week
- OWASP Threat Dragon core files☆29Updated 4 years ago
- Docker Secure Computing Profile Generator☆49Updated 4 years ago
- A standard allowing organizations to nominate security contact points and policies via DNS TXT records.☆32Updated 7 months ago
- Materials for the BSides NoVA/Charleston 2018 Bro Workshop☆14Updated 7 months ago
- Certificate Revocation List monitor☆46Updated last year
- Things to know when DFIR occurs near a vault deployment.☆44Updated 7 years ago
- Security scanning & static analysis tool☆93Updated last year
- The clever vulnerability dependency finder☆96Updated 3 years ago