Repository for the Open Security Reference Architecture
☆140Apr 23, 2026Updated last week
Alternatives and similar repositories for SecurityArchitecture
Users that are interested in SecurityArchitecture are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- General Open Architecture Security Questionnaire☆31Jul 25, 2023Updated 2 years ago
- AI featured threat modeling and security review project☆17Nov 17, 2024Updated last year
- DEPRECATED! Community-maintained Chef Cookbook to deploy StackStorm, IFTTT for Ops☆16Jul 28, 2020Updated 5 years ago
- Zeek BACnet Parser - CISA ICSNPP☆23Nov 6, 2025Updated 5 months ago
- A Pythonic framework for threat modeling☆1,123Apr 15, 2026Updated 2 weeks ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A simple IOS application that uses mobilenet to classify 1000 different images from an IOS device's video camera.☆11Aug 5, 2019Updated 6 years ago
- Public tables and other research that can accept PRs. Please visit the web link.☆44Aug 30, 2019Updated 6 years ago
- Tools for security content automation, baseline tailoring, and overlay development.☆45Aug 30, 2024Updated last year
- A set of policies, standards and control procedures with mapping to HIPAA, NIST CSF, PCI DSS, SOC2, FedRAMP, CIS Controls, and more.☆345Feb 19, 2026Updated 2 months ago
- Hardens Windows Server to CIS Standards☆40May 2, 2019Updated 7 years ago
- OpenControl-formatted industry standards and requirement documents☆50Aug 28, 2023Updated 2 years ago
- A curated list of tools for incident response☆21Sep 24, 2019Updated 6 years ago
- ☆12Feb 19, 2026Updated 2 months ago
- Examples on how to maintain security/compliance as code and to automate SecOps using the JupiterOne platform.☆54Mar 26, 2026Updated last month
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆17Sep 13, 2021Updated 4 years ago
- FortiAnalyzer mimick using an ELK stack☆10Aug 3, 2020Updated 5 years ago
- Simple DLP monitor for AWS S3 is a tool built on top of CloudWatch events and Lambda functions to alert you when data is transferred to S…☆18Mar 4, 2020Updated 6 years ago
- Stanford CoreNLP NER addon for Apache Tika's NamerEntityParser☆13Feb 26, 2022Updated 4 years ago
- dawg the hallway monitor - monitor operating system changes and analyze introduced attack surface when installing software☆55Nov 14, 2019Updated 6 years ago
- The Robot Security Framework (RSF), Robot Security Framework (RSF), a standardized methodology to perform security assessments in robotic…☆98Dec 28, 2018Updated 7 years ago
- Templates for the Microsoft Threat Modeling Tool☆178Updated this week
- Vulnerability consolidation and management tool, enhances scan results by merging different findings of the same weakness across multiple…☆24Dec 16, 2022Updated 3 years ago
- The open source version of the AWS Security Hub documentation. To provide feedback or request changes, you can submit a pull request that…☆35Jun 16, 2023Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- 🍱 bento is an English-based automation language designed to be used by non-technical people.☆32Aug 7, 2019Updated 6 years ago
- File Shooter (uv_link_t, uv_ssl_t, uv_http_t)☆11Jul 8, 2016Updated 9 years ago
- ☆14May 9, 2025Updated 11 months ago
- Segment's Threat Modeling training for our engineers☆246May 4, 2021Updated 4 years ago
- Burp extension for decoding WCF-gzipped requests.☆12Jan 25, 2016Updated 10 years ago
- Build a local copy of MITRE ATT&CK and CAPEC. Server mode for easy querying.☆35Updated this week
- Official repository of the AWS CloudHSM User Guide (https://docs.aws.amazon.com/cloudhsm/latest/userguide/)☆18Jun 15, 2023Updated 2 years ago
- CyHy Dashboard☆25Updated this week
- WebDigger is a python based tool, specially created to get a company's unknown domain for pentestor.☆17Aug 6, 2016Updated 9 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ☆26Apr 12, 2026Updated 2 weeks ago
- Java bindings for STIX☆23Sep 28, 2017Updated 8 years ago
- Web app that provides basic navigation and annotation of ATT&CK matrices☆17Nov 7, 2020Updated 5 years ago
- Swag for the OWASP projects and chapters☆44Mar 29, 2026Updated last month
- A crowd sourced curriculum of mandatory material for new front-end devs.☆47Feb 8, 2016Updated 10 years ago
- Interoperability Test for Braid Protocol☆12Dec 10, 2022Updated 3 years ago
- ☆23Apr 2, 2017Updated 9 years ago