App that simplifies building decision trees to model adverse scenarios
☆228Jul 11, 2024Updated last year
Alternatives and similar repositories for deciduous
Users that are interested in deciduous are comparing it to the libraries listed below
Sorting:
- A Pythonic framework for threat modeling☆1,110Feb 24, 2026Updated last week
- ☆30Jan 13, 2026Updated last month
- Draw.io libraries for threat modeling diagrams☆786Nov 12, 2020Updated 5 years ago
- Agile Threat Modeling Toolkit☆727Nov 20, 2025Updated 3 months ago
- ☆46Nov 7, 2024Updated last year
- Unauthenticated enumeration of AWS IAM Roles.☆26Sep 7, 2025Updated 5 months ago
- threatspec - continuous threat modeling, through code☆379Dec 30, 2020Updated 5 years ago
- Stochastic Traffic Factoring Utility☆16Nov 5, 2016Updated 9 years ago
- StartLeft is an automation tool for generating Threat Models written in the Open Threat Model (OTM) format from a variety of different so…☆53Nov 25, 2025Updated 3 months ago
- A Continuous Threat Modeling methodology☆324Jun 24, 2022Updated 3 years ago
- A production-friendly malware scanner for your AWS cloud☆201Jul 14, 2021Updated 4 years ago
- Modeling, analyzing and rendering attack trees.☆11Sep 9, 2021Updated 4 years ago
- Decision trees generated via Graphviz to inform pragmatic threat modelling.☆11Jan 16, 2021Updated 5 years ago
- Takes a software bill of materials and outputs provenance, and activity data from trustypkg.dev☆10May 19, 2025Updated 9 months ago
- OWASP Ontology-driven Threat Modelling framework☆40Jul 11, 2023Updated 2 years ago
- Attack Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by devel…☆719Nov 14, 2025Updated 3 months ago
- Automated deployment of MISP and MISP-Dashboard via K8S and AWS☆19Dec 9, 2019Updated 6 years ago
- Awesome secure by default libraries to help you eliminate bug classes!☆700Dec 6, 2025Updated 2 months ago
- Gram is Klarna's own threat model diagramming tool☆331Jan 26, 2026Updated last month
- ☆14Jan 8, 2026Updated last month
- DFF (Digital Forensics Framework)☆11Jan 6, 2021Updated 5 years ago
- Dragon-GPT uses Chat-GPT, or local LLM, to execute automatic and AI-powered threat modeling analysis on a given OWASP Threat Dragon diagr…☆41Jun 20, 2025Updated 8 months ago
- A security tool that detects malicious packages from external vulnerability feeds and searches for them in your package registries or art…☆69Nov 27, 2025Updated 3 months ago
- A tool to automatically build a dependency graph and Software Bill of Materials (SBOM) for packages and arbitrary source code repositorie…☆385Feb 26, 2026Updated last week
- Documenting your Threat Models with HCL☆454Updated this week
- boostsecurityio/lotp☆139Feb 24, 2026Updated last week
- A simple threat modeling tool to help humans to reduce time-to-value when threat modeling☆680Updated this week
- Octoscan is a static vulnerability scanner for GitHub action workflows.☆245Dec 8, 2025Updated 2 months ago
- A curated list of threat modeling resources (Books, courses - free and paid, videos, tools, tutorials and workshops to practice on ) for …☆1,716Aug 2, 2024Updated last year
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆112Jan 2, 2025Updated last year
- Mirror of cisa.gov/kev data files☆71Feb 26, 2026Updated last week
- Repository with supporting materials for Invictus Academy/Training☆44Jan 3, 2025Updated last year
- Systematic Classification Engine for Advanced Data ANalysis☆22Mar 6, 2017Updated 8 years ago
- ☆18Jul 30, 2024Updated last year
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆181Dec 11, 2025Updated 2 months ago
- Create notes during a security code review in VSCode 📝 Import your favorite SAST tool findings 🛠️ and collaborate with others 🤝☆142Feb 26, 2026Updated last week
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆69Jun 25, 2025Updated 8 months ago
- A dataset of software supply chain compromises. Please help us maintain it!☆131Sep 16, 2022Updated 3 years ago
- Data about all known supply-chain attacks through history☆63May 28, 2025Updated 9 months ago