freedomofpress / threat-modelingLinks
experimental threat modeling tools
☆14Updated 2 years ago
Alternatives and similar repositories for threat-modeling
Users that are interested in threat-modeling are comparing it to the libraries listed below
Sorting:
- A Java library for programmatically calculating OWASP Risk Rating scores☆18Updated 2 years ago
- Docker Secure Computing Profile Generator☆48Updated 3 years ago
- Markdown Version of the DHS/CISA Secure Software Development Self Attestation Form.☆21Updated 2 years ago
- Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.☆13Updated last year
- go-audit is an alternative to the auditd daemon that ships with many distros☆16Updated 6 years ago
- An operator which calls zeek to nix-ecosystem simply.☆10Updated 2 years ago
- Looks for GitHub org users without 2FA turned on☆9Updated 8 years ago
- CERTITUDE - A python package to classify malicious URLs☆20Updated 3 years ago
- A standard allowing organizations to nominate security contact points and policies via DNS TXT records.☆31Updated 3 months ago
- Detect Phishing fetching Certificate Transparency Logs☆20Updated 4 years ago
- FSL Test bench - Ansible playbook repository to setup a save environment for security auditing and testing. It can be used for teaching s…☆29Updated 6 months ago
- Simple tool to monitor network changes over time and trigger alerts☆15Updated 5 years ago
- ☆33Updated 2 years ago
- Script for applied security baseline controls in RedHat/CentOS.☆12Updated 8 years ago
- OWASP Threat Dragon with Gitlab Integration☆27Updated 7 years ago
- Notes and reference for ongoing forecasting.☆16Updated 3 years ago
- A modern CLI for Tenable.io written in Go☆14Updated 4 years ago
- An easy way to give all your EC2 instances SSH host certificates☆16Updated 2 years ago
- Policy Pipeline : place an SDLC around your compliance documentation with a pipeline that renders policy-as-code to human friendly format…☆11Updated 4 years ago
- Extract, defang, resolve names and IPs from text☆23Updated last year
- A curated threat modeling library collection☆22Updated last year
- Script to check ModSecurity rules agains some WAF☆12Updated 6 years ago
- Browser extension that complements the PhishDetect service☆24Updated 2 years ago
- D4 core software (server and sample sensor client)☆42Updated last year
- A catalog designed for environments with multiple or diffuse Information Security vulnerability-related information sources.☆12Updated last year
- Register your Kubernetes IPs to monitor.shodan.io☆18Updated 2 years ago
- Using osquery for Mass Incident Detection & Response☆19Updated 8 years ago
- A low/zero interaction ssh authentication logging honeypot☆22Updated 10 months ago
- Command line utility for parsing certificates☆63Updated 4 years ago
- Build Automated Machine Images for MISP☆28Updated last year