rpetrich / deciduous
App that simplifies building decision trees to model adverse scenarios
☆208Updated 9 months ago
Alternatives and similar repositories for deciduous:
Users that are interested in deciduous are comparing it to the libraries listed below
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆172Updated 5 months ago
- Documenting your Threat Models with HCL☆426Updated 8 months ago
- Segment's Threat Modeling training for our engineers☆243Updated 4 years ago
- 🖇️ STRIDE vs. ASVS equivalence table☆76Updated 8 months ago
- threatspec - continuous threat modeling, through code☆356Updated 4 years ago
- This repo is a consolidation of Secure Software Supply Chain resources, such as talks, whitepapers, conferences and more.☆138Updated 2 years ago
- The Elevation of Privilege Threat Modeling Game☆322Updated 10 months ago
- A tool for preventing the installation of malicious PyPI and npm packages☆140Updated this week
- boostsecurityio/poutine☆267Updated this week
- ☆77Updated 6 months ago
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆194Updated this week
- ☆63Updated 2 years ago
- Stakeholder-Specific Vulnerability Categorization☆147Updated 3 weeks ago
- A tool to check the security settings of Github Organizations.☆71Updated last year
- ☆87Updated 3 years ago
- Software Component Verification Standard (SCVS)☆144Updated last month
- A full insecure kubernetes application for testing security tools☆84Updated 2 weeks ago
- Simple plug-and-play Github Action to block unauthorized outbound traffic (egress) in your Github workflows☆95Updated 3 weeks ago
- Repository for the Open Information Security Risk Universe☆63Updated 2 years ago
- ☆102Updated last week
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆58Updated last year
- A repository with examples of CycloneDX BOMs (SBOM, SaaSBOM, OBOM, VEX, etc)☆193Updated 3 weeks ago
- OpenVEX Specification☆148Updated last month
- ☆112Updated 3 months ago
- We borrow the concept of 'personas' from UX/service design and apply it to threat actors to improve understanding between security, techn…☆10Updated 4 years ago
- The S2C2F Project is a group working within the OpenSSF's Supply Chain Integrity Working Group formed to further develop and continuously…☆207Updated 3 months ago
- A Continuous Threat Modeling methodology☆319Updated 2 years ago
- Minimum Viable Secure Product mvsp.dev☆192Updated 4 months ago
- The Security Champion Framework provides both a measuring stick and a roadmap generator for Champion Programs.☆108Updated last year
- ☆178Updated 2 weeks ago