Amazon Web Services (AWS) Microsoft Threat Modeling Tool Template
☆16Aug 19, 2021Updated 4 years ago
Alternatives and similar repositories for aws-threat-modeling-tool-template
Users that are interested in aws-threat-modeling-tool-template are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆19Feb 16, 2022Updated 4 years ago
- Deploy multiple instances of Nessus in docker containers easily☆20Mar 31, 2021Updated 4 years ago
- GetSimple CMS Custom JS Plugin Exploit RCE Chain☆11Mar 8, 2023Updated 3 years ago
- This program aims to check active targets by saving screenshots in a project.☆14Jan 9, 2026Updated 2 months ago
- A python tool help to interact with chatgpt.☆10Dec 11, 2022Updated 3 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆70Jun 25, 2025Updated 9 months ago
- How to create an OS from scratch☆12Jan 22, 2020Updated 6 years ago
- An Ethereum crowdfunding component written in React Js and Web3.☆16Jan 24, 2023Updated 3 years ago
- ☆25Oct 4, 2025Updated 5 months ago
- ☆19Oct 4, 2021Updated 4 years ago
- Script alternativo para a enumeração de diretórios e arquivos☆25Jun 2, 2021Updated 4 years ago
- Chrome Extension For Blockchain.info Wallets☆24Sep 10, 2015Updated 10 years ago
- git clone all repositories and gists from a given GitHub username☆32Feb 27, 2026Updated last month
- Get the unique machine id of any host (without admin privileges)☆21Jul 15, 2025Updated 8 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆15Jun 12, 2020Updated 5 years ago
- Exploiting CVE-2017-7525 demo project with Angular7 frontend and Spring.☆18Feb 21, 2019Updated 7 years ago
- Energy trading system for neighbor communities using Hyperledger.☆13Dec 15, 2023Updated 2 years ago
- Build, edit, validate, and export CycloneDX BOMs through an intuitive browser-based interface☆16Mar 13, 2026Updated 2 weeks ago
- ☆20May 24, 2021Updated 4 years ago
- This is a Ansible script for building a ready to go Cuckoo Sandbox server.☆26Mar 22, 2018Updated 8 years ago
- Code and materials for the talk "Set practice: coding & using sets in Go"☆11Jul 8, 2025Updated 8 months ago
- Open Threat Modeling Template☆52Jul 10, 2024Updated last year
- Data Structures and Algorithms☆15Aug 30, 2021Updated 4 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Reworked version of https://golang.org/src/crypto/tls/generate_cert.go☆14Aug 21, 2023Updated 2 years ago
- OSS License Open Data☆12Jun 28, 2019Updated 6 years ago
- SBOM generator for Debian-based distributions☆26Mar 23, 2026Updated last week
- Packer is a compact, fast and crosss-platform serialization library for store data in a buffer☆23Aug 5, 2023Updated 2 years ago
- ☆13Apr 21, 2021Updated 4 years ago
- CTF Writeups☆12Feb 25, 2023Updated 3 years ago
- Vuln Disclosure WG's new SIG☆11Jan 2, 2024Updated 2 years ago
- An interactive, TLS-capable HTTP intercepting proxy designed for penetration testers and software developers, including a parser for the …☆24Jul 31, 2025Updated 7 months ago
- Templates for the Microsoft Threat Modeling Tool☆178Aug 4, 2025Updated 7 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- docker-compose bringing up multiple vulnerable applications inside containers.☆19Jan 29, 2018Updated 8 years ago
- ☆30Mar 1, 2023Updated 3 years ago
- Miner(cpu or gpu) for bitcoin, secretly run in a period of time☆23Dec 26, 2022Updated 3 years ago
- a practical example of Shamir's secret sharing scheme☆19Sep 25, 2024Updated last year
- ☆21Jan 3, 2025Updated last year
- Command line client for splitting secrets using Shamir's Secret Sharing Algorithm☆16Apr 2, 2017Updated 8 years ago
- Malware dev tricks. Syscalls part 1. Simple C example☆10Jun 8, 2023Updated 2 years ago