nccgroup / The_Automotive_Threat_Modeling_TemplateLinks
NCC Group Template for the Microsoft Threat Modeling Tool 2016 for Automotive Security
☆48Updated 5 years ago
Alternatives and similar repositories for The_Automotive_Threat_Modeling_Template
Users that are interested in The_Automotive_Threat_Modeling_Template are comparing it to the libraries listed below
Sorting:
- OWASP IoT Security Verification Standard (ISVS)☆144Updated 2 years ago
- Python API for the CVSS v3☆59Updated 4 years ago
- IriusRisk Community☆67Updated 2 years ago
- TROMMEL: Sift Through Embedded Device Files to Identify Potential Vulnerable Indicators☆209Updated 5 years ago
- Embedded AppSec Best Practices☆42Updated 2 years ago
- Security Payload Unit Test Repository (SPUTR)☆86Updated 2 years ago
- A curated threat modeling library collection☆22Updated last year
- Open Threat Modeling Template☆52Updated last year
- Attify Badge GUI tool to interact over UART, SPI, JTAG, GPIO etc.☆69Updated 4 years ago
- CANBus protection used to isolate third party systems requiring OBDII access.☆19Updated 10 years ago
- A Java library for parsing and programmatically using threat models☆81Updated 2 years ago
- The USB host security assessment tool☆282Updated 6 years ago
- ☆33Updated 3 years ago
- CryptOMG is a configurable CTF style test bed that highlights common flaws in cryptographic implementations.☆193Updated 10 years ago
- SWAMP-in-a-Box☆62Updated 4 years ago
- Externalize Java application access to protected resources as log messages.☆43Updated last week
- This repository shows the prompts we used for each agent in CVE-Genie☆23Updated 4 months ago
- Tools for conducting analysis of CVE data in Elasticsearch☆75Updated 2 months ago
- AppSecPipeline Specification for DevOps automation.☆40Updated 2 years ago
- A GUI-based USB device fuzzer☆64Updated 7 years ago
- tumbleRF: a unified fuzzing framework for low-level RF and HW protocol/PHY/MAC analysis☆162Updated 7 years ago
- With the hope that someone finds the data useful, we used to periodically publish an archive of almost all of the non-sensitive vulnerabi…☆96Updated last year
- Desktop variant of OWASP Threat Dragon☆78Updated 4 years ago
- Content for 'JIRA Risk Project' book published at LeanPub☆57Updated 7 years ago
- A Burp plugin to export findings to DefectDojo☆30Updated last year
- A Crowdsourcing Exchange for mapping various sources of security vulnerabilities, exposures, threats, and controls data☆27Updated 6 years ago
- Static Token And Credential Scanner☆95Updated 2 years ago
- Challenges from past S4 (SCADA Security Scientific Symposium) Capture-the-Flag contests.☆28Updated 9 years ago
- An extension for BurpSuite that highlights SSO messages in Burp's proxy window..☆118Updated 4 years ago
- The Web Audit Search Engine - Index and Search HTTP Requests and Responses in Web Application Audits with ElasticSearch☆114Updated 4 years ago