iriusrisk / OpenThreatModel
The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.
☆170Updated 2 months ago
Alternatives and similar repositories for OpenThreatModel:
Users that are interested in OpenThreatModel are comparing it to the libraries listed below
- 🖇️ STRIDE vs. ASVS equivalence table☆75Updated 5 months ago
- The Security Champion Framework provides both a measuring stick and a roadmap generator for Champion Programs.☆106Updated last year
- Documenting your Threat Models with HCL☆413Updated 4 months ago
- Segment's Threat Modeling training for our engineers☆240Updated 3 years ago
- OWASP Foundation Web Respository☆81Updated last week
- ☆91Updated 2 months ago
- A tool to check the security settings of Github Organizations.☆70Updated last year
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆59Updated last year
- StartLeft is an automation tool for generating Threat Models written in the Open Threat Model (OTM) format from a variety of different so…☆49Updated 2 weeks ago
- ThreatModel for Amazon S3 - Library of all the attack scenarios on Amazon S3, and how to mitigate them following a risk-based approach☆150Updated last year
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆61Updated 7 months ago
- App that simplifies building decision trees to model adverse scenarios☆195Updated 6 months ago
- A full insecure kubernetes application for testing security tools☆64Updated this week
- AI featured threat modeling and security review action☆42Updated 2 months ago
- threatspec - continuous threat modeling, through code☆343Updated 4 years ago
- Software Component Verification Standard (SCVS)☆138Updated 9 months ago
- This repo is a consolidation of Secure Software Supply Chain resources, such as talks, whitepapers, conferences and more.☆137Updated 2 years ago
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆70Updated 8 months ago
- This is a companion to the Security Engineer Questions☆202Updated last year
- A tool for preventing the installation of malicious PyPI and npm packages☆114Updated last month
- Cloud Commotion intends to cause chaos to simulate security incidents☆141Updated 7 months ago
- ☆71Updated 3 months ago
- A compilation of Software Supply Chain Security resources including initiatives, standards, regulations, organizations, vendors, tooling,…☆130Updated last year
- ☆111Updated 3 weeks ago
- CNAPPgoat is an open source project designed to modularly provision vulnerable-by-design components in cloud environments.☆271Updated 4 months ago
- KaiMonkey provides vulnerable infrastructure as code (IaC) to help explore and understand common cloud security threats exposed via IaC.☆97Updated last year
- ☆111Updated 2 weeks ago
- A standard API specification for exchanging supply chain artifacts and intelligence☆68Updated last month
- Compares and analyzes GCP IAM roles.☆77Updated 8 months ago