mike-goodwin / owasp-threat-dragon-coreView external linksLinks
OWASP Threat Dragon core files
☆11Jan 26, 2026Updated 3 weeks ago
Alternatives and similar repositories for owasp-threat-dragon-core
Users that are interested in owasp-threat-dragon-core are comparing it to the libraries listed below
Sorting:
- OWASP Threat Dragon core files☆29May 15, 2021Updated 4 years ago
- Dragon-GPT uses Chat-GPT, or local LLM, to execute automatic and AI-powered threat modeling analysis on a given OWASP Threat Dragon diagr…☆41Jun 20, 2025Updated 7 months ago
- Desktop variant of OWASP Threat Dragon☆77Jul 8, 2021Updated 4 years ago
- A collection of my Semgrep rules☆51Jul 4, 2023Updated 2 years ago
- ☆17Feb 3, 2026Updated 2 weeks ago
- ☆11Jul 10, 2024Updated last year
- ☆13Dec 28, 2024Updated last year
- ☆12Sep 18, 2015Updated 10 years ago
- A list of CVE's with Proof of Concepts☆11Jun 17, 2021Updated 4 years ago
- GNAT Components Collection – Bindings to C libraries☆16Updated this week
- Create temporary login session for AWS CLI☆11Nov 6, 2019Updated 6 years ago
- NVD API 2.0 for python☆12Sep 26, 2024Updated last year
- The CRIME and BREACH Attacks work against SSL and HTTP Compression. They leverage specific properties of used compression functions and c…☆17Dec 29, 2013Updated 12 years ago
- Ada Unit Testing Library☆10Aug 3, 2025Updated 6 months ago
- How can you track the hunting techniques you come up with?☆13Sep 3, 2017Updated 8 years ago
- A CommonJS library for working with Common Vulnerability Scoring System vectors and scores.☆12Jul 14, 2022Updated 3 years ago
- Zstandard for Ada - Fast real-time compression algorithm☆16Feb 3, 2023Updated 3 years ago
- An Ada 2012 package to parse command line arguments and options☆12Apr 3, 2022Updated 3 years ago
- scripts to create zip bombs☆12Nov 26, 2012Updated 13 years ago
- Markdown parser☆11Nov 28, 2025Updated 2 months ago
- Custom semgrep rules registry☆14Aug 23, 2022Updated 3 years ago
- EPSScall☆11Jun 10, 2022Updated 3 years ago
- AWS security scanning checks in a container☆13Apr 11, 2016Updated 9 years ago
- Build and publish Docker images, run builds/tasks within Docker containers or on remote hosts.☆16Updated this week
- Bithoven is a smart contract language for composing powerful and secure instruments on Bitcoin. LR(1) parser with static analysis for com…☆41Updated this week
- Julia rules for semgrep☆14Dec 9, 2025Updated 2 months ago
- Bitclamp allows arbitrary files to be permanently and anonymously published into the Bitcoin and Dogecoin blockchains.☆14Jan 12, 2017Updated 9 years ago
- Spring Cloud Config Client with Fallback implementation for cases when the the config server is down☆11Mar 21, 2016Updated 9 years ago
- Welcome to Autoaudit, a log tampering detection tool.☆13Mar 19, 2024Updated last year
- ☆12Jul 7, 2022Updated 3 years ago
- A terraform module providing an opinionated Consul cluster built on an ECS cluster in AWS.☆15Mar 12, 2020Updated 5 years ago
- ☆13Oct 30, 2023Updated 2 years ago
- Contributor License Agreement of the Jenkins project☆11Nov 17, 2025Updated 3 months ago
- Python client and module for Vulnerability-Lookup.☆14Dec 9, 2025Updated 2 months ago
- Binary builds for dep-scan - The Dependency Scanner☆10Apr 1, 2024Updated last year
- Based on shawarkhanethicalhacker/BruteXSS☆15Jan 24, 2019Updated 7 years ago
- Mass Hunting & Exploitation PoC for CVE-2025-55182 & CVE-2025-66478☆38Dec 7, 2025Updated 2 months ago
- This work-in-progress "Orion Webshell Detector" was created with the intention of assisting web application code reviews coded in PHP, AS…☆13Oct 28, 2014Updated 11 years ago
- 🔗 Source for the Caido plugin store☆16Updated this week