Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. Sugar-Free and Secure: no any external dependencies except for chart plotting are used
☆70Jun 25, 2025Updated 9 months ago
Alternatives and similar repositories for TicTaaC
Users that are interested in TicTaaC are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- StartLeft is an automation tool for generating Threat Models written in the Open Threat Model (OTM) format from a variety of different so…☆54Mar 4, 2026Updated 3 weeks ago
- Amazon Web Services (AWS) Microsoft Threat Modeling Tool Template☆16Aug 19, 2021Updated 4 years ago
- verinice.veo is a cloud-native application for managing information security and data protection☆22Mar 17, 2026Updated last week
- 🖇️ equivalence table between OWASP ASVS standard and STRIDE threat modeling methodology.☆76Aug 22, 2024Updated last year
- Agile Threat Modeling as Code☆13Jun 30, 2022Updated 3 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Agile Threat Modeling Toolkit☆737Mar 12, 2026Updated 2 weeks ago
- threatspec - continuous threat modeling, through code☆383Dec 30, 2020Updated 5 years ago
- ☆14Dec 3, 2022Updated 3 years ago
- Simple script for testing CVE-2016-2402 and similar flaws☆13Mar 30, 2016Updated 9 years ago
- ☆20Mar 3, 2018Updated 8 years ago
- A Java library for parsing and programmatically using threat models☆82Feb 15, 2023Updated 3 years ago
- Repo to hold mapping of user-security-stories☆120Nov 28, 2018Updated 7 years ago
- OWASP Ontology-driven Threat Modelling framework☆40Jul 11, 2023Updated 2 years ago
- A curated list of threat modeling resources (Books, courses - free and paid, videos, tools, tutorials and workshops to practice on ) for …☆1,731Aug 2, 2024Updated last year
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- An AI-powered threat modeling tool that leverages OpenAI's GPT models to generate threat models for a given application based on the STRI…☆994Mar 2, 2026Updated 3 weeks ago
- Templates for the Microsoft Threat Modeling Tool☆178Aug 4, 2025Updated 7 months ago
- sbomasm: The Complete SBOM Management Toolkit☆107Updated this week
- A collection of diagramming tools to help create DevOps/DevSecOps reference architectures☆80Oct 16, 2023Updated 2 years ago
- ☆10Aug 28, 2020Updated 5 years ago
- App that simplifies building decision trees to model adverse scenarios☆228Jul 11, 2024Updated last year
- AT-AT (Attack Tree Analysis Tool) is a application that allows users to develop and analyze attack trees. The overall goal is to automati…☆29Aug 17, 2022Updated 3 years ago
- Automate bug bounty recon using bash alias☆15Aug 6, 2024Updated last year
- OWASP ZAP add-on to detect reflected parameter vulnerabilities efficiently☆12Feb 19, 2021Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆22Apr 17, 2023Updated 2 years ago
- A Continuous Threat Modeling methodology☆324Jun 24, 2022Updated 3 years ago
- ☆35Mar 8, 2022Updated 4 years ago
- InfoSec OpenAI Examples☆19Nov 26, 2023Updated 2 years ago
- The Web Security Testing Guide is a comprehensive open source guide to testing the security of web applications and web services.☆31Oct 27, 2025Updated 5 months ago
- Zap baseline scanner in Docker with authentication☆103May 13, 2024Updated last year
- The challenge toolbox is a small component which allows you to create, run and check new challenges locally.☆27Mar 11, 2024Updated 2 years ago
- Microsoft Threat Modeling Template files☆202Nov 28, 2022Updated 3 years ago
- The Open Security Summit is focused on the collaboration between, Developers and Application Security☆45Jul 9, 2025Updated 8 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- This project is about creating and publishing threat model examples.☆430Nov 10, 2021Updated 4 years ago
- ☆114Jun 8, 2023Updated 2 years ago
- An online multiplayer version of the Elevation of Privilege (EoP) threat modeling card game☆160Feb 27, 2026Updated last month
- materials we hand out☆147Jul 17, 2025Updated 8 months ago
- Issues to consider when planning a red team exercise.☆14Aug 23, 2017Updated 8 years ago
- Gram is Klarna's own threat model diagramming tool☆332Updated this week
- Find world writable directories that contain a .exe or .dll file☆13Aug 31, 2021Updated 4 years ago