Provides content useful for IriusRisk threat modelling, including templates, API scripts, libraries and more.
☆16Feb 10, 2026Updated last month
Alternatives and similar repositories for IriusRisk-Central
Users that are interested in IriusRisk-Central are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Tool for building a PDF document from markdown files, using LaTeX styles and features.☆13Aug 7, 2021Updated 4 years ago
- Finds internet-exposed resources in an AWS account☆18Sep 1, 2024Updated last year
- StartLeft is an automation tool for generating Threat Models written in the Open Threat Model (OTM) format from a variety of different so…☆54Mar 4, 2026Updated 3 weeks ago
- Library supporting secure keys, and crypto enabled JSON and CBOR☆16Mar 4, 2026Updated 3 weeks ago
- A simple golang job queue☆13Jan 19, 2023Updated 3 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- The Software Parts (SParts) lab delivers a Sawtooth-based ledger that provides both accountability and access to the open source componen…☆12Feb 20, 2020Updated 6 years ago
- lab files for LA serverless application labs☆12Feb 26, 2020Updated 6 years ago
- A monitoring hub that watches popular open-source repositories and uses AI to detect when commits are patching security vulnerabilities -…☆99Updated this week
- Repo to accompany the SIGGRAPH webinar☆22Feb 7, 2021Updated 5 years ago
- ☆16Updated this week
- Z Camera E2 firmware reverse-engineering results.☆17Oct 8, 2023Updated 2 years ago
- OWASP Foundation Web Respository☆10Mar 14, 2026Updated 2 weeks ago
- Public website cyclonedx.org☆12Dec 20, 2024Updated last year
- Deals with WSDLs☆17Updated this week
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- SIG Security - Software Bill of Materials☆19Aug 26, 2022Updated 3 years ago
- A collection of packages for using GitHub security advisories in Node.js.☆18Updated this week
- Report missing advisories and corrections on OSS Index☆17Jan 19, 2023Updated 3 years ago
- Pandas pipeline in graphviz☆11Mar 28, 2022Updated 4 years ago
- Templates to integrate Fortify application security testing with Amazon Web Services (AWS), Azure, Google Cloud Platform (GCP) and Oracle…☆18Nov 9, 2024Updated last year
- Labs for Threat Modelling training delivered by ControlPlane☆35Updated this week
- Examples of using Snyk's SBOM APIs.☆16Sep 29, 2022Updated 3 years ago
- ☆35Mar 8, 2022Updated 4 years ago
- OWASP Foundation Web Respository☆23Feb 27, 2026Updated last month
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Kanban for GitHub Issues☆21Sep 26, 2019Updated 6 years ago
- [Fugitive was made to offer resourcfulness to 'Osint Investigations' Fugitive will allow you to collect detailed information about "subje…☆36Jun 9, 2023Updated 2 years ago
- ☆22Updated this week
- A script that simplifies working with archetypes in Hugo! (@gohugoio) Also supports bulk file creation/editing via a single .csv! 🐍☆17Nov 15, 2021Updated 4 years ago
- This project aims to standardize the representation and management of EOL and EOS product information across the industry.☆30Mar 4, 2024Updated 2 years ago
- Utility to quickly view bidirectional encodings for code hosted online☆23Nov 2, 2021Updated 4 years ago
- An experimental project using LLM technology to generate security documentation for Open Source Software (OSS) projects☆36Feb 28, 2025Updated last year
- OWASP Foundation web repository☆36Mar 16, 2026Updated 2 weeks ago
- goframe is a Go package inspired by Python's pandas, designed for data manipulation and analysis.☆34Feb 2, 2026Updated last month
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A free HTML email template, featuring high resolutions images, single and double columns, fully functional and tested across all major em…☆26Feb 26, 2025Updated last year
- ☆17Dec 9, 2022Updated 3 years ago
- Generate VEX (Vulnerability Exploitability Exchange) CycloneDX documents☆23Jan 19, 2025Updated last year
- 🧿 Graph visualizer for JIRA ticket dependencies (epics, tasks, statuses, links, and more).☆18Jul 12, 2024Updated last year
- AES implementation in pure Golang, including ECB, CBC, CFB, OFB, CTR and GCM mode.☆19Mar 21, 2024Updated 2 years ago
- Generate SoftWare IDentification (SWID) Tags according to ISO/IEC 19770-2:2015☆17Jul 12, 2025Updated 8 months ago
- Dragon-GPT uses Chat-GPT, or local LLM, to execute automatic and AI-powered threat modeling analysis on a given OWASP Threat Dragon diagr…☆41Jun 20, 2025Updated 9 months ago