App that simplifies building decision trees to model adverse scenarios
☆230Jul 11, 2024Updated last year
Alternatives and similar repositories for deciduous
Users that are interested in deciduous are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Decision trees generated via Graphviz to inform pragmatic threat modelling.☆11Jan 16, 2021Updated 5 years ago
- A Pythonic framework for threat modeling☆1,125Updated this week
- threatspec - continuous threat modeling, through code☆383Dec 30, 2020Updated 5 years ago
- A production-friendly malware scanner for your AWS cloud☆200Jul 14, 2021Updated 4 years ago
- Agile Threat Modeling Toolkit☆760Apr 8, 2026Updated 3 weeks ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Draw.io libraries for threat modeling diagrams☆791Nov 12, 2020Updated 5 years ago
- A Continuous Threat Modeling methodology☆327Jun 24, 2022Updated 3 years ago
- StartLeft is an automation tool for generating Threat Models written in the Open Threat Model (OTM) format from a variety of different so…☆54Mar 4, 2026Updated 2 months ago
- ☆30Jan 13, 2026Updated 3 months ago
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆72Jun 25, 2025Updated 10 months ago
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆181Dec 11, 2025Updated 4 months ago
- A tool to automatically build a dependency graph and Software Bill of Materials (SBOM) for packages and arbitrary source code repositorie…☆390Updated this week
- Awesome secure by default libraries to help you eliminate bug classes!☆704Dec 6, 2025Updated 5 months ago
- A curated list of threat modeling resources (Books, courses - free and paid, videos, tools, tutorials and workshops to practice on ) for …☆1,748Aug 2, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Gram is Klarna's own threat model diagramming tool☆334Apr 23, 2026Updated 2 weeks ago
- OWASP Ontology-driven Threat Modelling framework☆43Jul 11, 2023Updated 2 years ago
- Octoscan is a static vulnerability scanner for GitHub action workflows.☆266Mar 30, 2026Updated last month
- Documenting your Threat Models with HCL☆458Apr 12, 2026Updated 3 weeks ago
- Takes a software bill of materials and outputs provenance, and activity data from trustypkg.dev☆10May 19, 2025Updated 11 months ago
- Everything Application Security☆27Apr 28, 2026Updated last week
- Unauthenticated enumeration of AWS IAM Roles.☆26Apr 18, 2026Updated 2 weeks ago
- ☆18Jul 30, 2024Updated last year
- Automated deployment of MISP and MISP-Dashboard via K8S and AWS☆19Dec 9, 2019Updated 6 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Attack Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by devel…☆738Updated this week
- Supply Chain Security Research - Living Off The Pipeline tools☆150Apr 14, 2026Updated 3 weeks ago
- DevSecOps Working Group☆12Sep 24, 2019Updated 6 years ago
- Create notes during a security code review in VSCode 📝 Import your favorite SAST tool findings 🛠️ and collaborate with others 🤝☆142Updated this week
- A simple threat modeling tool to help humans to reduce time-to-value when threat modeling☆708Apr 29, 2026Updated last week
- ☆69Jul 18, 2025Updated 9 months ago
- A unified DevSecOps Framework that allows you to go from iterative, collaborative Threat Modeling to Application Security Test Orchestrat…☆281Feb 17, 2026Updated 2 months ago
- A security tool that detects malicious packages from external vulnerability feeds and searches for them in your package registries or art…☆69Nov 27, 2025Updated 5 months ago
- Compares and analyzes GCP IAM roles.☆79Mar 9, 2025Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Agile Threat Modeling as Code☆13Jun 30, 2022Updated 3 years ago
- Data about all known supply-chain attacks through history