freedomofpress / threat-modeling
experimental threat modeling tools
☆14Updated 2 years ago
Alternatives and similar repositories for threat-modeling:
Users that are interested in threat-modeling are comparing it to the libraries listed below
- A Java library for programmatically calculating OWASP Risk Rating scores☆18Updated last year
- CERTITUDE - A python package to classify malicious URLs☆20Updated 2 years ago
- Looks for GitHub org users without 2FA turned on☆9Updated 8 years ago
- OWASP Threat Dragon with Gitlab Integration☆25Updated 7 years ago
- Core incident handling plugins for aws_ir cli, incident pony, and more.☆21Updated 6 years ago
- go-audit is an alternative to the auditd daemon that ships with many distros☆16Updated 6 years ago
- A catalog designed for environments with multiple or diffuse Information Security vulnerability-related information sources.☆12Updated last year
- Extract, defang, resolve names and IPs from text☆23Updated last year
- ☆33Updated 2 years ago
- Script to check ModSecurity rules agains some WAF☆12Updated 6 years ago
- D4 core software (server and sample sensor client)☆42Updated last year
- A starter-kit for a source-controlled, CLI-based osquery management workflow.☆30Updated 6 years ago
- An operator which calls zeek to nix-ecosystem simply.☆10Updated 2 years ago
- FSL Test bench - Ansible playbook repository to setup a save environment for security auditing and testing. It can be used for teaching s…☆29Updated 3 months ago
- Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.☆13Updated last year
- Register your Kubernetes IPs to monitor.shodan.io☆18Updated 2 years ago
- ☆11Updated 7 years ago
- Policy Pipeline : place an SDLC around your compliance documentation with a pipeline that renders policy-as-code to human friendly format…☆11Updated 4 years ago
- A vulnerability assessment tool for system models☆13Updated 3 years ago
- A tool for testing continuous integration (CI) or continuous delivery (CD) system security☆23Updated 11 years ago
- CVE Builder script that generates STIX formatted Exploit Target objects☆18Updated 8 years ago
- A python wrapper around https://cve.circl.lu.☆55Updated 10 months ago
- first commit☆20Updated last year
- ☆14Updated 7 years ago
- Repo to hold veracode related issues and code snippets☆9Updated 7 years ago
- A gitbook for doing a null Bangalore session on linux container security to discuss and teach namespaces, cgroups etc.☆20Updated 7 years ago
- Darkbit Cloud Security Tools☆25Updated 4 years ago
- A low/zero interaction ssh authentication logging honeypot☆21Updated 7 months ago
- Markdown Version of the DHS/CISA Secure Software Development Self Attestation Form.☆21Updated last year
- efficient linux security monitoring☆26Updated 6 years ago