Open Threat Modeling Template
☆52Jul 10, 2024Updated last year
Alternatives and similar repositories for OTMT
Users that are interested in OTMT are comparing it to the libraries listed below
Sorting:
- Microsoft Threat Modeling Template files☆202Nov 28, 2022Updated 3 years ago
- Templates for the Microsoft Threat Modeling Tool☆174Aug 4, 2025Updated 7 months ago
- ☆20Mar 3, 2018Updated 8 years ago
- Assess certain AWS network configurations☆12Aug 22, 2018Updated 7 years ago
- An attack tree generator built on electron☆62May 23, 2016Updated 9 years ago
- A JRuby implementation of the BurpExtender interface for PortSwigger Burp Suite. Not currently maintained -- see tduehr/buby☆28Apr 30, 2011Updated 14 years ago
- Integration Jenkins pipeline functions☆10Dec 2, 2025Updated 3 months ago
- ☆11Mar 9, 2023Updated 3 years ago
- Threat Modeling Tool Extension for Penetration Tester (TMTe4PT)☆12Mar 2, 2022Updated 4 years ago
- Privacy Cards for Software Developers☆54May 17, 2019Updated 6 years ago
- ☆54Nov 15, 2017Updated 8 years ago
- In-depth and hands-on practice for acing the exam.☆15Jun 21, 2024Updated last year
- OWASP Foundation Web Respository☆17Dec 9, 2025Updated 3 months ago
- ☆14Jul 26, 2021Updated 4 years ago
- SAP Report Source Decompressor☆14Jun 7, 2018Updated 7 years ago
- An open source, online threat modelling tool from OWASP☆484Jul 18, 2025Updated 7 months ago
- AppSecPipeline Specification for DevOps automation.☆40Dec 8, 2022Updated 3 years ago
- This is a working copy of the OWASP Project Handbook and is the draft where changes are made before publishing a final version on the OWA…☆18Feb 22, 2017Updated 9 years ago
- Scans npmjs.org for npm packages that can be taken over☆19Jun 6, 2022Updated 3 years ago
- Gordon is status check Github app to enforce and validate about.yaml file specifications in a repository during pull requests to drive co…☆20Feb 4, 2025Updated last year
- IriusRisk Community☆71Sep 5, 2023Updated 2 years ago
- An extension for BurpSuite that highlights SSO messages in Burp's proxy window..☆120Apr 26, 2021Updated 4 years ago
- ☆19Jun 11, 2013Updated 12 years ago
- A framework for understanding the capabilities of automated detection methods at identifying classes of application security vulnerabilit…☆33Updated this week
- This projects provides a logger and a connected harlem shake js.☆20May 17, 2024Updated last year
- A meta-database collecting resources that compile lists of breaches☆21Oct 30, 2025Updated 4 months ago
- An interactive way to learn threat modeling☆17Feb 14, 2019Updated 7 years ago
- SAP security analysis (using sap gui scripting)☆19Jun 28, 2020Updated 5 years ago
- Log4Shell CVE-2021-44228 mitigation tester☆16Dec 13, 2021Updated 4 years ago
- ☆16Jun 21, 2021Updated 4 years ago
- A Continuous Threat Modeling methodology☆324Jun 24, 2022Updated 3 years ago
- This repository will teach you have to do my talk "Pushing Left, Like a Boss".☆71Jan 1, 2022Updated 4 years ago
- SentinelOne's SACK CVE Fixer☆22Jul 2, 2019Updated 6 years ago
- All the stuff needed for producing the podcasts. Shamelessly stolen from the fine folks at Food Fight☆23Sep 29, 2015Updated 10 years ago
- A MAL language that demonstrates the Maven project structure☆23Feb 27, 2026Updated last week
- Everything Application Security☆27Mar 3, 2026Updated last week
- Caterpillar is a security scanning library for AI agent skill files (e.g., Claude Code skills) for dangerous or malicious behavior☆38Feb 16, 2026Updated 3 weeks ago
- Enchant is is tool aimed to discover web application directory and pages by fuzzing the requests using a dictionary approach.☆25Oct 5, 2015Updated 10 years ago
- A collection of DoD and Federal Government Cloud Computing Resources☆49Mar 29, 2021Updated 4 years ago