freedomofpress / threat-modelingLinks
experimental threat modeling tools
☆14Updated 2 years ago
Alternatives and similar repositories for threat-modeling
Users that are interested in threat-modeling are comparing it to the libraries listed below
Sorting:
- A curated threat modeling library collection☆22Updated last year
- Command line utility for parsing certificates☆65Updated 4 years ago
- Welcome to OpenDevSecOps! Our mission is to deliver highly-resilient, readily-available and free defensive and offensive devops security …☆21Updated 6 years ago
- NIST OSCAL SDK and CLI☆38Updated 5 years ago
- Collect, curate, and communicate relevant security metrics for open source projects.☆63Updated last year
- A low/zero interaction ssh authentication logging honeypot☆23Updated last year
- Rumble Network Discovery API☆17Updated last year
- a curated list of useful threat modeling resources☆139Updated last year
- OWASP Threat Dragon core files☆29Updated 4 years ago
- Docker Secure Computing Profile Generator☆48Updated 3 years ago
- Golang-based subdomain miner leveraging certificate transparency logs☆76Updated 2 years ago
- A local scanner for vulnerable web applications☆40Updated 2 months ago
- A starter-kit for a source-controlled, CLI-based osquery management workflow.☆30Updated 7 years ago
- Markdown Version of the DHS/CISA Secure Software Development Self Attestation Form.☆21Updated 2 years ago
- A monitoring tool for certificate transparency of ProtonMail's SSL/TLS certificates☆51Updated 7 years ago
- A standard allowing organizations to nominate security contact points and policies via DNS TXT records.☆32Updated 3 months ago
- A Java library for programmatically calculating OWASP Risk Rating scores☆18Updated 2 years ago
- Utility for annotating Internet datasets with contextual metadata (e.g., origin AS, MaxMind GeoIP2, reverse DNS, and WHOIS)☆102Updated 3 months ago
- A library and a tool for converting audit logs to XML and JSON☆46Updated 7 years ago
- D4 core software (server and sample sensor client)☆42Updated last year
- Script to check ModSecurity rules agains some WAF☆12Updated 6 years ago
- Provide a shell like interface by utilizing osquery's distributed API☆81Updated 5 years ago
- A python wrapper around https://cve.circl.lu.☆55Updated 3 months ago
- CVE Builder script that generates STIX formatted Exploit Target objects☆18Updated 8 years ago
- This is the public security policy of CISOfy, with extra resources like security tools.☆93Updated 5 years ago
- Looks up details on a public IPV4 address against ip-info and blacklist-search sites. Providing a reputation check.☆12Updated 3 years ago
- ansible role to setup MISP, Malware Information Sharing Platform & Threat Sharing☆54Updated last week
- Things to know when DFIR occurs near a vault deployment.☆43Updated 7 years ago
- Customizable Security Scanner written in Go☆16Updated 9 years ago
- ☆14Updated 8 years ago