rusakovichma / TicTaaCView external linksLinks
Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. Sugar-Free and Secure: no any external dependencies except for chart plotting are used
☆68Jun 25, 2025Updated 7 months ago
Alternatives and similar repositories for TicTaaC
Users that are interested in TicTaaC are comparing it to the libraries listed below
Sorting:
- StartLeft is an automation tool for generating Threat Models written in the Open Threat Model (OTM) format from a variety of different so…☆52Nov 25, 2025Updated 2 months ago
- Amazon Web Services (AWS) Microsoft Threat Modeling Tool Template☆16Aug 19, 2021Updated 4 years ago
- threatspec - continuous threat modeling, through code☆376Dec 30, 2020Updated 5 years ago
- Agile Threat Modeling Toolkit☆723Nov 20, 2025Updated 2 months ago
- HoneyDB Python Module☆14Feb 6, 2024Updated 2 years ago
- ☆10Aug 28, 2020Updated 5 years ago
- ☆14Dec 3, 2022Updated 3 years ago
- Agile Threat Modeling as Code☆13Jun 30, 2022Updated 3 years ago
- Admin for☆16Jun 3, 2018Updated 7 years ago
- A Pythonic framework for threat modeling☆1,103Feb 9, 2026Updated last week
- A Java library for parsing and programmatically using threat models☆82Feb 15, 2023Updated 3 years ago
- Repo to hold mapping of user-security-stories☆120Nov 28, 2018Updated 7 years ago
- ☆14Nov 13, 2023Updated 2 years ago
- ☆19Feb 16, 2022Updated 4 years ago
- Maturity Model Collaborative project☆15Feb 27, 2023Updated 2 years ago
- A curated list of threat modeling resources (Books, courses - free and paid, videos, tools, tutorials and workshops to practice on ) for …☆1,707Aug 2, 2024Updated last year
- Links to materials referenced in the SANS Tech Tuesday workshop June 30,2020☆29Oct 7, 2020Updated 5 years ago
- This project is about creating and publishing threat model examples.☆427Nov 10, 2021Updated 4 years ago
- Damn Vulnerable PHP Application (DVPA) - It is Lab Written in The PHP lang, Which Contains PHP Type Juggling - RCE Challenges☆33May 18, 2022Updated 3 years ago
- ☆15Oct 11, 2023Updated 2 years ago
- Cloud security tutorials and best practices☆38Mar 20, 2023Updated 2 years ago
- A Continuous Threat Modeling methodology☆324Jun 24, 2022Updated 3 years ago
- The Repository contains various payloads, tools, tips and tricks from various hackers around the world. Please take a quick look down her…☆15May 15, 2025Updated 9 months ago
- A custom script I created because I got tired of installing my tools manually!☆15May 16, 2023Updated 2 years ago
- Templates for the Microsoft Threat Modeling Tool☆172Aug 4, 2025Updated 6 months ago
- Web service for http://sshpot.com/☆77Dec 25, 2016Updated 9 years ago
- ☆21Apr 17, 2023Updated 2 years ago
- Secure Jupyter Notebooks and Experimentation Environment☆85Feb 6, 2025Updated last year
- Web app that provides basic navigation and annotation of ATT&CK matrices☆17Nov 7, 2020Updated 5 years ago
- code reviews to practice☆18Jul 22, 2021Updated 4 years ago
- ☆21Jul 15, 2016Updated 9 years ago
- ☆19Oct 19, 2021Updated 4 years ago
- TAXII Server supporting the 2.1 spec.☆20Mar 30, 2020Updated 5 years ago
- An AI-powered threat modeling tool that leverages OpenAI's GPT models to generate threat models for a given application based on the STRI…☆979Dec 28, 2025Updated last month
- 🖇️ equivalence table between OWASP ASVS standard and STRIDE threat modeling methodology.☆76Aug 22, 2024Updated last year
- A self assessment tool to help understand your level in the SANS Vulnerability Management Maturity Model (VMMM).☆52Nov 24, 2025Updated 2 months ago
- ☆20Jan 18, 2022Updated 4 years ago
- ☆20Mar 3, 2018Updated 7 years ago
- The Open Security Summit is focused on the collaboration between, Developers and Application Security☆45Jul 9, 2025Updated 7 months ago