App that simplifies building decision trees to model adverse scenarios
☆229Jul 11, 2024Updated last year
Alternatives and similar repositories for deciduous
Users that are interested in deciduous are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Decision trees generated via Graphviz to inform pragmatic threat modelling.☆11Jan 16, 2021Updated 5 years ago
- A Pythonic framework for threat modeling☆1,122Apr 9, 2026Updated last week
- threatspec - continuous threat modeling, through code☆383Dec 30, 2020Updated 5 years ago
- A production-friendly malware scanner for your AWS cloud☆200Jul 14, 2021Updated 4 years ago
- Modeling, analyzing and rendering attack trees.☆11Sep 9, 2021Updated 4 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Agile Threat Modeling Toolkit☆741Apr 8, 2026Updated last week
- Draw.io libraries for threat modeling diagrams☆788Nov 12, 2020Updated 5 years ago
- A Continuous Threat Modeling methodology☆327Jun 24, 2022Updated 3 years ago
- StartLeft is an automation tool for generating Threat Models written in the Open Threat Model (OTM) format from a variety of different so…☆54Mar 4, 2026Updated last month
- ☆30Jan 13, 2026Updated 3 months ago
- ☆46Nov 7, 2024Updated last year
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆181Dec 11, 2025Updated 4 months ago
- A tool to automatically build a dependency graph and Software Bill of Materials (SBOM) for packages and arbitrary source code repositorie…☆389Updated this week
- Awesome secure by default libraries to help you eliminate bug classes!☆702Dec 6, 2025Updated 4 months ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- A curated list of threat modeling resources (Books, courses - free and paid, videos, tools, tutorials and workshops to practice on ) for …☆1,741Aug 2, 2024Updated last year
- Gram is Klarna's own threat model diagramming tool☆332Updated this week
- OWASP Ontology-driven Threat Modelling framework☆43Jul 11, 2023Updated 2 years ago
- Octoscan is a static vulnerability scanner for GitHub action workflows.☆253Mar 30, 2026Updated 2 weeks ago
- Unauthenticated enumeration of AWS IAM Roles.☆26Sep 7, 2025Updated 7 months ago
- Documenting your Threat Models with HCL☆457Updated this week
- Takes a software bill of materials and outputs provenance, and activity data from trustypkg.dev☆10May 19, 2025Updated 10 months ago
- Everything Application Security☆27Mar 30, 2026Updated 2 weeks ago
- ☆18Jul 30, 2024Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Attack Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by devel…☆727Nov 14, 2025Updated 5 months ago
- Automated deployment of MISP and MISP-Dashboard via K8S and AWS☆19Dec 9, 2019Updated 6 years ago
- Supply Chain Security Research - Living Off The Pipeline tools☆149Mar 3, 2026Updated last month
- DevSecOps Working Group☆12Sep 24, 2019Updated 6 years ago
- A simple threat modeling tool to help humans to reduce time-to-value when threat modeling☆700Apr 8, 2026Updated last week
- ☆69Jul 18, 2025Updated 8 months ago
- A unified DevSecOps Framework that allows you to go from iterative, collaborative Threat Modeling to Application Security Test Orchestrat…☆281Feb 17, 2026Updated last month
- A security tool that detects malicious packages from external vulnerability feeds and searches for them in your package registries or art…☆69Nov 27, 2025Updated 4 months ago
- Data about all known supply-chain attacks through history☆65May 28, 2025Updated 10 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Compares and analyzes GCP IAM roles.☆79Mar 9, 2025Updated last year
- Agile Threat Modeling as Code☆13Jun 30, 2022Updated 3 years ago
- Inspect certificate authorities in container images☆241Dec 4, 2025Updated 4 months ago
- ☆14Jan 8, 2026Updated 3 months ago
- GitHub Attack Toolkit - Extreme Edition - A static analysis and exploit toolkit for GitHub Actions.☆505Mar 6, 2026Updated last month
- Dragon-GPT uses Chat-GPT, or local LLM, to execute automatic and AI-powered threat modeling analysis on a given OWASP Threat Dragon diagr…☆42Jun 20, 2025Updated 9 months ago
- ☆150Updated this week