paulveillard / cybersecurity-threat-modeling
An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources about Threat Modeling in Cybersecurity.
☆12Updated 6 months ago
Related projects: ⓘ
- A collection of awesome framework, libraries, learning tutorials, videos, webcasts, technical resources and cool stuff about General Data…☆11Updated 10 months ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆16Updated 2 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, website…☆11Updated 2 years ago
- A collection of awesome framework, libraries, learning tutorials, videos, webcasts, technical resources and cool stuff about Social Engin…☆16Updated 2 years ago
- A collection of awesome tools, software, libraries, learning tutorials & videos, frameworks, best practices and technical resources abou…☆45Updated last year
- Content Discovery Development Platform. A tool to create your own CD solution. This is the new official repo for the project, old C++ and…☆32Updated this week
- An ongoing collection of of AWS tools, frameworks, libraries, learning tutorials for InfoSec and security professionals☆21Updated 2 years ago
- An ongoing & curated collection of awesome software practices and remediation, libraries and frameworks,payloads and techniques, best gui…☆27Updated 11 months ago
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆32Updated last year
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆53Updated last year
- An ongoing & curated collection of awesome AuthN+Z software, libraries and frameworks, best guidelines and technical resources and cool s…☆15Updated 9 months ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 2 years ago
- ☆14Updated 2 years ago
- InfoSec OpenAI Examples☆19Updated 9 months ago
- An Automated Mass Network Vulnerability Scanner and Recon Tool☆31Updated last year
- Nessus Cheat Sheet in HTML, PDF, PNG, ADOC☆11Updated 2 years ago
- An ongoing collection of awesome android security tools, software, libraries, learning tutorials, frameworks, academic and practical reso…☆12Updated 2 years ago
- Virtual Security Operations Center☆49Updated last year
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 2 months ago
- MyOpenVDP is a free web application to install a vulnerability disclosure policy or a vulnerability disclosure program on your assets. (V…☆26Updated last month
- An ongoing & curated collection of awesome vulnerability scanning software, libraries and frameworks, best guidelines, technical resource…☆9Updated 2 years ago
- A collection of dashboards, templates, API's and Power BI code for vulnerability management and analysis☆12Updated 3 weeks ago
- ☆14Updated last year
- Basic guide for performing a Physical PenTest - Nist 800-12, 800-53, 800-115, 800-152☆15Updated last year
- OWASP ASVS Security Evaluation Templates with Nuclei☆16Updated last week
- DefectDojo Community Content☆17Updated 5 months ago
- Maturity Model Collaborative project☆13Updated last year
- A command-line utility for auditing DNS configuration using Zonemaster API☆27Updated last year
- 📚A curated list of product security resources.☆18Updated 2 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆15Updated 2 years ago