freedomofpress / threat-modelingLinks
experimental threat modeling tools
☆14Updated 2 years ago
Alternatives and similar repositories for threat-modeling
Users that are interested in threat-modeling are comparing it to the libraries listed below
Sorting:
- A Java library for programmatically calculating OWASP Risk Rating scores☆18Updated 2 years ago
- Script to check ModSecurity rules agains some WAF☆12Updated 6 years ago
- Command line utility for parsing certificates☆64Updated 4 years ago
- Policy Pipeline : place an SDLC around your compliance documentation with a pipeline that renders policy-as-code to human friendly format…☆11Updated 4 years ago
- A standard allowing organizations to nominate security contact points and policies via DNS TXT records.☆31Updated 3 weeks ago
- An operator which calls zeek to nix-ecosystem simply.☆10Updated 2 years ago
- Markdown Version of the DHS/CISA Secure Software Development Self Attestation Form.☆21Updated 2 years ago
- The Auditree data gathering and reporting tool.☆15Updated 10 months ago
- A low/zero interaction ssh authentication logging honeypot☆22Updated 10 months ago
- Core incident handling plugins for aws_ir cli, incident pony, and more.☆21Updated 6 years ago
- Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.☆13Updated last year
- Tips to protect your personal and company data☆29Updated 5 years ago
- Linux filesystem with a Google Docs backend, built using FUSE☆10Updated 5 years ago
- A catalog designed for environments with multiple or diffuse Information Security vulnerability-related information sources.☆12Updated last year
- A starter-kit for a source-controlled, CLI-based osquery management workflow.☆30Updated 7 years ago
- Docker details and examples for the Lynis project☆27Updated 8 years ago
- OSCAL SSP content for technologies shipped by Red Hat☆15Updated 2 years ago
- Register your Kubernetes IPs to monitor.shodan.io☆18Updated 2 years ago
- A privacy-aware exchange module to securely and privately share your indicators☆13Updated 7 years ago
- Collect, curate, and communicate relevant security metrics for open source projects.☆63Updated last year
- Extract, defang, resolve names and IPs from text☆23Updated last year
- Detect Phishing fetching Certificate Transparency Logs☆20Updated 4 years ago
- A curated threat modeling library collection☆22Updated last year
- Wrapper for concurrent batch processing of testssl.sh commands☆13Updated 6 years ago
- OCSP Responder monitor☆37Updated 10 months ago
- CERTITUDE - A python package to classify malicious URLs☆20Updated 3 years ago
- FSL Test bench - Ansible playbook repository to setup a save environment for security auditing and testing. It can be used for teaching s…☆29Updated 7 months ago
- An easy way to give all your EC2 instances SSH host certificates☆16Updated 2 years ago
- Abusing Cloudflare Workers to establish persistence and exfiltrate sensitive data at the edge.☆17Updated 2 years ago
- NIST OSCAL SDK and CLI☆38Updated 5 years ago