Draw.io libraries for threat modeling diagrams
☆790Nov 12, 2020Updated 5 years ago
Alternatives and similar repositories for drawio-threatmodeling
Users that are interested in drawio-threatmodeling are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This project is about creating and publishing threat model examples.☆432Nov 10, 2021Updated 4 years ago
- A curated list of threat modeling resources (Books, courses - free and paid, videos, tools, tutorials and workshops to practice on ) for …☆1,747Aug 2, 2024Updated last year
- A Pythonic framework for threat modeling☆1,122Apr 9, 2026Updated last week
- Agile Threat Modeling Toolkit☆741Apr 8, 2026Updated last week
- threatspec - continuous threat modeling, through code☆383Dec 30, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Segment's Threat Modeling training for our engineers☆245May 4, 2021Updated 4 years ago
- A Continuous Threat Modeling methodology☆327Jun 24, 2022Updated 3 years ago
- A unified DevSecOps Framework that allows you to go from iterative, collaborative Threat Modeling to Application Security Test Orchestrat…☆281Feb 17, 2026Updated last month
- An open source threat modeling tool from OWASP☆1,415Updated this week
- ☆88Jul 28, 2021Updated 4 years ago
- A simple threat modeling tool to help humans to reduce time-to-value when threat modeling☆700Apr 8, 2026Updated last week
- An open source, online threat modelling tool from OWASP☆484Jul 18, 2025Updated 8 months ago
- App that simplifies building decision trees to model adverse scenarios☆229Jul 11, 2024Updated last year
- This repository stores content that can be used to design a Rapid Threat Model Prototyping process for a software development group.☆165Mar 14, 2023Updated 3 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- a curated list of useful threat modeling resources☆149Jun 28, 2024Updated last year
- ☆69Jul 18, 2025Updated 8 months ago
- A place to gather and organize information about using threat modeling frameworks to deal with social conflict in online systems☆57Jun 19, 2025Updated 9 months ago
- Microsoft Threat Modeling Template files☆202Nov 28, 2022Updated 3 years ago
- ☆36Mar 8, 2022Updated 4 years ago
- A collection of real-world threat model examples across various technologies, providing practical insights into identifying and mitigatin…☆494Jun 12, 2025Updated 10 months ago
- An online multiplayer version of the Elevation of Privilege (EoP) threat modeling card game☆160Apr 2, 2026Updated 2 weeks ago
- goSDL☆521Nov 3, 2025Updated 5 months ago
- ☆571Apr 8, 2026Updated last week
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Application Security Verification Standard☆3,387Mar 17, 2026Updated 3 weeks ago
- Gram is Klarna's own threat model diagramming tool☆332Updated this week
- An installable desktop variant of OWASP Threat Dragon☆592Jan 29, 2026Updated 2 months ago
- An AI-powered threat modeling tool that leverages OpenAI's GPT models to generate threat models for a given application based on the STRI…☆1,004Mar 2, 2026Updated last month
- Open Threat Modeling Template☆52Jul 10, 2024Updated last year
- Templates for the Microsoft Threat Modeling Tool☆178Aug 4, 2025Updated 8 months ago
- Desktop variant of OWASP Threat Dragon☆77Jul 8, 2021Updated 4 years ago
- The Elevation of Privilege Threat Modeling Game☆350Jun 20, 2024Updated last year
- OWASP Foundation Web Respository☆20Dec 22, 2025Updated 3 months ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Node application to help managing Maturity Models like the ones created by BSIMM and OpenSAMM☆195Aug 27, 2018Updated 7 years ago
- Threat matrix for CI/CD Pipeline☆762Jul 8, 2024Updated last year
- VSAQ is an interactive questionnaire application to assess the security programs of third parties.☆860Jan 11, 2021Updated 5 years ago
- List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc.☆9,431Oct 16, 2025Updated 6 months ago
- OWASP Cloud Security - Enabling conversations through threat and control stories☆182Dec 7, 2018Updated 7 years ago
- 🔐CNCF Security Technical Advisory Group -- secure access, policy control, privacy, auditing, explainability and more!☆2,263Dec 8, 2025Updated 4 months ago
- Multi-Cloud Security Auditing Tool☆7,625Sep 23, 2025Updated 6 months ago