freedomofpress / threat-modelingLinks
experimental threat modeling tools
☆14Updated 2 years ago
Alternatives and similar repositories for threat-modeling
Users that are interested in threat-modeling are comparing it to the libraries listed below
Sorting:
- Command line utility for parsing certificates☆65Updated 4 years ago
- A curated threat modeling library collection☆22Updated last year
- Compares the TLS configuration of a web server to the Mozilla TLS Profiles☆25Updated last year
- ☆22Updated 7 years ago
- OWASP Threat Dragon core files☆28Updated 4 years ago
- A low/zero interaction ssh authentication logging honeypot☆23Updated last year
- Docker Secure Computing Profile Generator☆48Updated 3 years ago
- Script to check ModSecurity rules agains some WAF☆12Updated 6 years ago
- Certificate Revocation List monitor☆44Updated last year
- A modern CLI for Tenable.io written in Go☆14Updated 4 years ago
- D4 core software (server and sample sensor client)☆42Updated last year
- NIST OSCAL SDK and CLI☆38Updated 5 years ago
- Qubes OS DevOps automation☆58Updated last year
- Provide a shell like interface by utilizing osquery's distributed API☆81Updated 5 years ago
- A standard allowing organizations to nominate security contact points and policies via DNS TXT records.☆32Updated 3 months ago
- Welcome to OpenDevSecOps! Our mission is to deliver highly-resilient, readily-available and free defensive and offensive devops security …☆21Updated 6 years ago
- Rumble Network Discovery API☆17Updated last year
- Collect, curate, and communicate relevant security metrics for open source projects.☆63Updated last year
- a curated list of useful threat modeling resources☆139Updated last year
- Notes and reference for ongoing forecasting.☆16Updated 3 years ago
- OWASP Threat Dragon with Gitlab Integration☆27Updated 7 years ago
- Things to know when DFIR occurs near a vault deployment.☆43Updated 7 years ago
- Linux file read monitor☆90Updated last year
- A starter-kit for a source-controlled, CLI-based osquery management workflow.☆30Updated 7 years ago
- A python wrapper around https://cve.circl.lu.☆55Updated 2 months ago
- Detect Phishing fetching Certificate Transparency Logs☆20Updated 4 years ago
- CVE Builder script that generates STIX formatted Exploit Target objects☆18Updated 8 years ago
- A gitbook for doing a null Bangalore session on linux container security to discuss and teach namespaces, cgroups etc.☆20Updated 8 years ago
- Core incident handling plugins for aws_ir cli, incident pony, and more.☆21Updated 7 years ago
- A Passive SSH back-end and scanner.☆103Updated 2 months ago