Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. Sugar-Free and Secure: no any external dependencies except for chart plotting are used
☆69Jun 25, 2025Updated 8 months ago
Alternatives and similar repositories for TicTaaC
Users that are interested in TicTaaC are comparing it to the libraries listed below
Sorting:
- StartLeft is an automation tool for generating Threat Models written in the Open Threat Model (OTM) format from a variety of different so…☆53Nov 25, 2025Updated 3 months ago
- Amazon Web Services (AWS) Microsoft Threat Modeling Tool Template☆16Aug 19, 2021Updated 4 years ago
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆181Dec 11, 2025Updated 2 months ago
- An implementation of a Model Context Protocol (MCP) for the Nuclei scanner. This tool enables context-aware vulnerability scanning by int…☆39Aug 4, 2025Updated 7 months ago
- Agile Threat Modeling Toolkit☆727Nov 20, 2025Updated 3 months ago
- HoneyDB Python Module☆14Feb 6, 2024Updated 2 years ago
- Simple script for testing CVE-2016-2402 and similar flaws☆13Mar 30, 2016Updated 9 years ago
- ☆10Aug 28, 2020Updated 5 years ago
- Agile Threat Modeling as Code☆13Jun 30, 2022Updated 3 years ago
- The repository contains IOCs in CSV format for APT, Cyber Crimes, Malware and Trojan and whatever I found as part of hunting and research☆12Jun 10, 2017Updated 8 years ago
- Admin for☆16Jun 3, 2018Updated 7 years ago
- OWASP ZAP add-on to detect reflected parameter vulnerabilities efficiently☆12Feb 19, 2021Updated 5 years ago
- ☆14Dec 3, 2022Updated 3 years ago
- A Pythonic framework for threat modeling☆1,110Feb 24, 2026Updated last week
- A Java library for parsing and programmatically using threat models☆82Feb 15, 2023Updated 3 years ago
- Repo to hold mapping of user-security-stories☆120Nov 28, 2018Updated 7 years ago
- A curated list of threat modeling resources (Books, courses - free and paid, videos, tools, tutorials and workshops to practice on ) for …☆1,719Aug 2, 2024Updated last year
- Links to materials referenced in the SANS Tech Tuesday workshop June 30,2020☆29Oct 7, 2020Updated 5 years ago
- This project is about creating and publishing threat model examples.☆429Nov 10, 2021Updated 4 years ago
- Damn Vulnerable PHP Application (DVPA) - It is Lab Written in The PHP lang, Which Contains PHP Type Juggling - RCE Challenges☆32May 18, 2022Updated 3 years ago
- Cloud security tutorials and best practices☆38Mar 20, 2023Updated 2 years ago
- A Continuous Threat Modeling methodology☆324Jun 24, 2022Updated 3 years ago
- SecTalks socially authored website☆20Jul 23, 2025Updated 7 months ago
- A custom script I created because I got tired of installing my tools manually!☆15May 16, 2023Updated 2 years ago
- The Repository contains various payloads, tools, tips and tricks from various hackers around the world. Please take a quick look down her…☆15May 15, 2025Updated 9 months ago
- Templates for the Microsoft Threat Modeling Tool☆174Aug 4, 2025Updated 7 months ago
- ☆21Apr 17, 2023Updated 2 years ago
- Secure Jupyter Notebooks and Experimentation Environment☆86Feb 6, 2025Updated last year
- OWASP Foundation Project Web Repository for Secure Coding Practices Quick-reference Guide☆73May 22, 2024Updated last year
- ☆19Oct 19, 2021Updated 4 years ago
- version 2 of the Unified Cybersecurity Ontology☆16May 7, 2017Updated 8 years ago
- Web app that provides basic navigation and annotation of ATT&CK matrices☆17Nov 7, 2020Updated 5 years ago
- ☆21Jul 15, 2016Updated 9 years ago
- Automate bug bounty recon using bash alias☆15Aug 6, 2024Updated last year
- An AI-powered threat modeling tool that leverages OpenAI's GPT models to generate threat models for a given application based on the STRI…☆991Updated this week
- 🖇️ equivalence table between OWASP ASVS standard and STRIDE threat modeling methodology.☆76Aug 22, 2024Updated last year
- ☆20Jan 18, 2022Updated 4 years ago
- The Open Security Summit is focused on the collaboration between, Developers and Application Security☆45Jul 9, 2025Updated 7 months ago
- ☆25Nov 8, 2024Updated last year