nccgroup / The_Automotive_Threat_Modeling_TemplateLinks
NCC Group Template for the Microsoft Threat Modeling Tool 2016 for Automotive Security
☆47Updated 4 years ago
Alternatives and similar repositories for The_Automotive_Threat_Modeling_Template
Users that are interested in The_Automotive_Threat_Modeling_Template are comparing it to the libraries listed below
Sorting:
- Embedded AppSec Best Practices☆41Updated last year
- OWASP IoT Security Verification Standard (ISVS)☆141Updated 2 years ago
- A curated threat modeling library collection☆22Updated last year
- Open Threat Modeling Template☆50Updated 10 months ago
- A Crowdsourcing Exchange for mapping various sources of security vulnerabilities, exposures, threats, and controls data☆26Updated 6 years ago
- IriusRisk Community☆65Updated last year
- CANBus protection used to isolate third party systems requiring OBDII access.☆19Updated 10 years ago
- ☆33Updated 3 years ago
- A Java library for parsing and programmatically using threat models☆79Updated 2 years ago
- OWASP IoT Top 10 2018 Mapping Project☆19Updated 5 years ago
- Attify Badge GUI tool to interact over UART, SPI, JTAG, GPIO etc.☆69Updated 4 years ago
- Security Payload Unit Test Repository (SPUTR)☆86Updated 2 years ago
- Set of data collected during a series of man-in-the-middle (MITM) attacks run against the Kenexis Portable Industrial Control System (ICS…☆27Updated 9 years ago
- A Burp plugin to export findings to DefectDojo☆30Updated last year
- ☆26Updated 4 years ago
- Vulnerability consolidation and management tool, enhances scan results by merging different findings of the same weakness across multiple…☆24Updated 2 years ago
- Internet-of-Things (IoT) hacking lab exercise as showcased at RSA 2018, Hack NYC, and Hack the Capital☆34Updated 5 years ago
- A GUI-based USB device fuzzer☆64Updated 7 years ago
- The iOS Agent for the Needle Security Assessment Framework☆43Updated 7 years ago
- Metasploit modules developed to demonstrate insecure by design PLC's as part of Project Basecamp☆62Updated 8 years ago
- TROMMEL: Sift Through Embedded Device Files to Identify Potential Vulnerable Indicators☆208Updated 4 years ago
- A collection of scripts & tools for reverse-engineering & hacking SCADA/ICS devices.☆106Updated 7 years ago
- Orchestron is an Application Vulnerability Management and Correlation Tool.Orchestron helps you solve one key problem "Find and fix vulne…☆31Updated 2 years ago
- With the hope that someone finds the data useful, we used to periodically publish an archive of almost all of the non-sensitive vulnerabi…☆93Updated last year
- Challenges from past S4 (SCADA Security Scientific Symposium) Capture-the-Flag contests.☆28Updated 8 years ago
- a 802.11 wireless fuzzer☆92Updated 12 years ago
- A few ZigBee Tools to compliment KillerBee☆53Updated 8 years ago
- Platform Firmware Auditing Tool☆130Updated 6 years ago
- This module helps you get started with basic Zigbee analysis, and later on performing additional attacks on the Zigbee protocol.☆11Updated 8 years ago
- OWASP Threat Dragon with Gitlab Integration☆27Updated 7 years ago