freedomofpress / threat-modeling
experimental threat modeling tools
☆14Updated 2 years ago
Alternatives and similar repositories for threat-modeling:
Users that are interested in threat-modeling are comparing it to the libraries listed below
- A Java library for programmatically calculating OWASP Risk Rating scores☆18Updated last year
- Markdown Version of the DHS/CISA Secure Software Development Self Attestation Form.☆21Updated last year
- Looks for GitHub org users without 2FA turned on☆9Updated 8 years ago
- Command line utility for parsing certificates☆63Updated 4 years ago
- A catalog designed for environments with multiple or diffuse Information Security vulnerability-related information sources.☆12Updated last year
- OWASP Threat Dragon with Gitlab Integration☆25Updated 7 years ago
- A vulnerability assessment tool for system models☆13Updated 3 years ago
- Passive Bitcoin Project☆10Updated 9 years ago
- A standard allowing organizations to nominate security contact points and policies via DNS TXT records.☆31Updated last year
- D4 core software (server and sample sensor client)☆42Updated last year
- A curated threat modeling library collection☆22Updated last year
- Browser extension that complements the PhishDetect service☆21Updated 2 years ago
- ☆14Updated 6 years ago
- ☆11Updated 6 years ago
- Certificate Revocation List monitor☆40Updated 6 months ago
- Repo to hold veracode related issues and code snippets☆9Updated 7 years ago
- OCSP Responder monitor☆34Updated 6 months ago
- Things to know when DFIR occurs near a vault deployment.☆43Updated 6 years ago
- CVE Builder script that generates STIX formatted Exploit Target objects☆18Updated 8 years ago
- Extract, defang, resolve names and IPs from text☆23Updated last year
- A starter-kit for a source-controlled, CLI-based osquery management workflow.☆30Updated 6 years ago
- CERTITUDE - A python package to classify malicious URLs☆20Updated 2 years ago
- Documents pertaining to internal policies and guidelines☆12Updated 8 years ago
- Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.☆13Updated last year
- Homographs: brutefind homographs within a font☆18Updated 7 years ago
- tamper resistant audit log☆18Updated 6 years ago
- Using osquery for Mass Incident Detection & Response☆19Updated 8 years ago
- A curated list of awesome things related to Tenzir☆12Updated last year
- Core incident handling plugins for aws_ir cli, incident pony, and more.☆21Updated 6 years ago
- Notes and reference for ongoing forecasting.☆16Updated 2 years ago