nccgroup / The_Automotive_Threat_Modeling_Template
NCC Group Template for the Microsoft Threat Modeling Tool 2016 for Automotive Security
☆47Updated 4 years ago
Alternatives and similar repositories for The_Automotive_Threat_Modeling_Template:
Users that are interested in The_Automotive_Threat_Modeling_Template are comparing it to the libraries listed below
- A curated threat modeling library collection☆22Updated last year
- OWASP IoT Security Verification Standard (ISVS)☆139Updated 2 years ago
- A Java library for parsing and programmatically using threat models☆79Updated 2 years ago
- Embedded AppSec Best Practices☆40Updated last year
- ☆32Updated 2 years ago
- IriusRisk Community☆63Updated last year
- A Crowdsourcing Exchange for mapping various sources of security vulnerabilities, exposures, threats, and controls data☆26Updated 5 years ago
- CANBus protection used to isolate third party systems requiring OBDII access.☆19Updated 9 years ago
- A Burp plugin to export findings to DefectDojo☆30Updated last year
- Python API for the CVSS v3☆58Updated 3 years ago
- Vulnerability consolidation and management tool, enhances scan results by merging different findings of the same weakness across multiple…☆24Updated 2 years ago
- Security Payload Unit Test Repository (SPUTR)☆86Updated last year
- ☆26Updated 3 years ago
- Orchestron is an Application Vulnerability Management and Correlation Tool.Orchestron helps you solve one key problem "Find and fix vulne…☆31Updated 2 years ago
- Attify Badge GUI tool to interact over UART, SPI, JTAG, GPIO etc.☆69Updated 3 years ago
- The iOS Agent for the Needle Security Assessment Framework☆42Updated 7 years ago
- Externalize Java application access to protected resources as log messages.☆40Updated 9 months ago
- OWASP Threat Dragon with Gitlab Integration☆25Updated 7 years ago
- 💣 REST and SOAP web API fuzzer☆26Updated 8 years ago
- OWASP Threat Dragon core files☆11Updated 6 months ago
- Semgrep rules corresponding to the OWASP ASVS standard☆27Updated 4 years ago
- TROMMEL: Sift Through Embedded Device Files to Identify Potential Vulnerable Indicators☆208Updated 4 years ago
- Open Threat Modeling Template☆49Updated 7 months ago
- CapFuzz - capture, fuzz & intercept web traffic.☆64Updated 5 years ago
- ☆10Updated 9 years ago
- A tool for auditing medical devices and healthcare infrastructure☆20Updated last year
- Project intended to make Attack Maps part of software development by reducing the time it takes to complete them.☆48Updated 8 years ago
- Scripts that we use for pentesting☆42Updated 7 years ago
- OWASP IoT Top 10 2018 Mapping Project☆17Updated 5 years ago
- Command line utilities for analyzing CANbus traffic☆70Updated 9 years ago