NCC Group Template for the Microsoft Threat Modeling Tool 2016 for Automotive Security
☆49Jul 10, 2020Updated 5 years ago
Alternatives and similar repositories for The_Automotive_Threat_Modeling_Template
Users that are interested in The_Automotive_Threat_Modeling_Template are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Microsoft Threat Modeling Template files☆204Nov 28, 2022Updated 3 years ago
- Simple mind maps for IoT security attack surfaces and methodologies☆17Aug 12, 2019Updated 6 years ago
- ☆14Sep 20, 2014Updated 11 years ago
- ☆17Jan 15, 2013Updated 13 years ago
- SpamAssassin Spam Score checker for Mautic☆11Apr 23, 2016Updated 10 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- SBOM Search - Context aware search in SBOM repositories☆32Nov 24, 2025Updated 5 months ago
- AppSecPipeline Specification for DevOps automation.☆40Dec 8, 2022Updated 3 years ago
- Driver Attack Platform for Linux☆18Mar 2, 2023Updated 3 years ago
- ☆40Nov 24, 2013Updated 12 years ago
- Repo to hold the markdown-ified metadata on AppSec tools that are automation-friendly☆12Jun 13, 2016Updated 9 years ago
- Data.world load scripts☆12Sep 3, 2017Updated 8 years ago
- DevSecOps Working Group☆12Sep 24, 2019Updated 6 years ago
- A collection of YARA signatures that I have found around the web.☆11Apr 29, 2016Updated 10 years ago
- Wireless Camera using LilyGo T-SimCam☆10Jun 7, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A client API for OWASP ZAP that uses Java types.☆20Mar 17, 2023Updated 3 years ago
- The command-line client for Journal☆12Oct 26, 2024Updated last year
- This is a repository for storing all of the scripts, documentation, binaries, etc. required to setup a Samsung Galaxy Note 10.1 2014 Edit…☆12Oct 17, 2020Updated 5 years ago
- Pentoo installer rewritten by Wuodan to be more modular☆11Jan 9, 2026Updated 4 months ago
- A Pythonic framework for threat modeling☆1,125May 2, 2026Updated 2 weeks ago
- A Snapchat clone written in Swift.☆19Sep 16, 2014Updated 11 years ago
- Presentations, training modules, and other education materials from Duo Security's Application Security team.☆76Jul 15, 2021Updated 4 years ago
- Source for official CVE Program policy documents.☆18Jan 28, 2026Updated 3 months ago
- ☆18Updated this week
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- This is the GitHub repo of the OpenChain SBOM Study Group☆12Apr 22, 2026Updated 3 weeks ago
- ☆88Jul 28, 2021Updated 4 years ago
- A binary rainfall visualizer for packet captures. Idea taken from Greg Conti's "Security Data Visualization".☆13Nov 5, 2020Updated 5 years ago
- Python interface for the MSR605 magnetic card reader☆18Jan 8, 2015Updated 11 years ago
- ☆15Dec 3, 2022Updated 3 years ago
- ☆37Mar 8, 2022Updated 4 years ago
- A Java library for parsing and programmatically using threat models☆82Feb 15, 2023Updated 3 years ago
- Simple RSS to CSV converter☆24Sep 24, 2023Updated 2 years ago
- Simple script for testing CVE-2016-2402 and similar flaws☆13Mar 30, 2016Updated 10 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Utility that provides an API and CLI to identify licenses and legal terms☆54Jul 11, 2025Updated 10 months ago
- Sample that illustrates using Azure KeyVault for Key Management to wrap / unwrap one-time use symmetric keys for encrypting serialized da…☆11May 24, 2017Updated 8 years ago
- Vulnerability Management tool using the CVE-Search database☆10Apr 22, 2016Updated 10 years ago
- We borrow the concept of 'personas' from UX/service design and apply it to threat actors to improve understanding between security, techn…☆11Jun 17, 2020Updated 5 years ago
- Build a local copy of CPE(Common Platform Enumeration)☆107May 11, 2026Updated last week
- please use https://github.com/fireeye/vivisect instead☆16Oct 21, 2025Updated 6 months ago
- Weather informer☆12Jul 5, 2022Updated 3 years ago