schutzwerk / tmte4ptLinks
Threat Modeling Tool Extension for Penetration Tester (TMTe4PT)
☆12Updated 3 years ago
Alternatives and similar repositories for tmte4pt
Users that are interested in tmte4pt are comparing it to the libraries listed below
Sorting:
- OWASP IoT Security Verification Standard (ISVS)☆148Updated 3 months ago
- ☆87Updated 4 years ago
- NCC Group Template for the Microsoft Threat Modeling Tool 2016 for Automotive Security☆48Updated 5 years ago
- IriusRisk Community☆71Updated 2 years ago
- threatspec - continuous threat modeling, through code☆374Updated 5 years ago
- This repository stores content that can be used to design a Rapid Threat Model Prototyping process for a software development group.☆164Updated 2 years ago
- Desktop variant of OWASP Threat Dragon☆78Updated 4 years ago
- Open Threat Modeling Template☆52Updated last year
- OWASP Foundation Web Respository☆32Updated 3 months ago
- ☆34Updated 3 years ago
- ☆124Updated 2 years ago
- Docs: Vulnerability management aggregation of AppSec & OpSec (Tools Listing)☆32Updated 2 years ago
- ☆69Updated 6 months ago
- A small tool to help developers understand a huge set of security requirements from appsec teams☆47Updated 3 years ago
- Segment's Threat Modeling training for our engineers☆245Updated 4 years ago
- Project intended to make Attack Maps part of software development by reducing the time it takes to complete them.☆47Updated 9 years ago
- A Continuous Threat Modeling methodology☆325Updated 3 years ago
- Software Component Verification Standard (SCVS)☆153Updated 9 months ago
- A Java library for parsing and programmatically using threat models☆82Updated 2 years ago
- This project is about creating and publishing threat model examples.☆427Updated 4 years ago
- Core model including reused documentation☆101Updated last month
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆68Updated 7 months ago
- A Crowdsourcing Exchange for mapping various sources of security vulnerabilities, exposures, threats, and controls data☆27Updated 6 years ago
- Computer Aided Integration of Requirements and Information Security - Server☆168Updated last month
- The Security Champion Framework provides both a measuring stick and a roadmap generator for Champion Programs.☆110Updated 2 years ago
- Python API library for DefectDojo