NCC Group Template for the Microsoft Threat Modeling Tool 2016 for Automotive Security
☆48Jul 10, 2020Updated 5 years ago
Alternatives and similar repositories for The_Automotive_Threat_Modeling_Template
Users that are interested in The_Automotive_Threat_Modeling_Template are comparing it to the libraries listed below
Sorting:
- Microsoft Threat Modeling Template files☆202Nov 28, 2022Updated 3 years ago
- Simple mind maps for IoT security attack surfaces and methodologies☆17Aug 12, 2019Updated 6 years ago
- Templates for the Microsoft Threat Modeling Tool☆174Aug 4, 2025Updated 7 months ago
- Sample native Android service☆15Feb 8, 2016Updated 10 years ago
- ☆17Jan 15, 2013Updated 13 years ago
- SBOM Search - Context aware search in SBOM repositories☆29Nov 24, 2025Updated 3 months ago
- AppSecPipeline Specification for DevOps automation.☆40Dec 8, 2022Updated 3 years ago
- Command line pastebin for sharing terminal output.☆11Jul 29, 2021Updated 4 years ago
- Driver Attack Platform for Linux☆18Mar 2, 2023Updated 3 years ago
- ☆40Nov 24, 2013Updated 12 years ago
- Repo to hold the markdown-ified metadata on AppSec tools that are automation-friendly☆12Jun 13, 2016Updated 9 years ago
- DevSecOps Working Group☆12Sep 24, 2019Updated 6 years ago
- A Python client for the Global CVE Allocation System.☆17Jan 31, 2026Updated last month
- A collection of YARA signatures that I have found around the web.☆11Apr 29, 2016Updated 9 years ago
- A client API for OWASP ZAP that uses Java types.☆20Mar 17, 2023Updated 3 years ago
- The command-line client for Journal☆12Oct 26, 2024Updated last year
- Pentoo installer rewritten by Wuodan to be more modular☆11Jan 9, 2026Updated 2 months ago
- Luxoft Automotive HMI Safe Renderer☆28Aug 25, 2020Updated 5 years ago
- Mixeway is security orchestrator for vulnerability scanners which enable easy plug in integration with CICD pipelines. MixewayBackend pro…☆17Sep 26, 2024Updated last year
- Handy extensions to the Google Maps Android API.☆12Jul 3, 2016Updated 9 years ago
- Open Threat Modeling Template☆52Jul 10, 2024Updated last year
- Build control images for Aboriginal Linux, http://landley.net/aboriginal/control-images☆13Jun 7, 2021Updated 4 years ago
- A Pythonic framework for threat modeling☆1,113Updated this week
- A high-performance DNS stub resolver for bulk lookups and reconnaissance (subdomain enumeration)☆21Feb 21, 2018Updated 8 years ago
- Source for official CVE Program policy documents.☆18Jan 28, 2026Updated last month
- Говнокод.ру - по колено в ко де☆24Oct 17, 2019Updated 6 years ago
- Latent Semantic Analysis Introduction: An information retrieval technique patented in 1988. In the context of its application to inform…☆17Nov 7, 2016Updated 9 years ago
- A repository for wardley maps related to security topics.☆46Feb 15, 2017Updated 9 years ago
- ☆32May 22, 2023Updated 2 years ago
- ☆88Jul 28, 2021Updated 4 years ago
- Android AOA2.0(ADK2) for Arduino☆13Sep 12, 2012Updated 13 years ago
- https://github.com/aligungr/UERANSIM☆10Apr 23, 2021Updated 4 years ago
- A Yocto meta-layer for generating CycloneDX SBOMs☆23Mar 13, 2026Updated last week
- ☆14Dec 3, 2022Updated 3 years ago
- A Java library for parsing and programmatically using threat models☆82Feb 15, 2023Updated 3 years ago
- Simple RSS to CSV converter☆24Sep 24, 2023Updated 2 years ago
- Simple script for testing CVE-2016-2402 and similar flaws☆13Mar 30, 2016Updated 9 years ago
- Utility that provides an API and CLI to identify licenses and legal terms☆52Jul 11, 2025Updated 8 months ago
- Sample that illustrates using Azure KeyVault for Key Management to wrap / unwrap one-time use symmetric keys for encrypting serialized da…☆11May 24, 2017Updated 8 years ago