☆69Jul 18, 2025Updated 8 months ago
Alternatives and similar repositories for materialize-threats
Users that are interested in materialize-threats are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This repository stores content that can be used to design a Rapid Threat Model Prototyping process for a software development group.☆165Mar 14, 2023Updated 3 years ago
- A unified DevSecOps Framework that allows you to go from iterative, collaborative Threat Modeling to Application Security Test Orchestrat…☆281Feb 17, 2026Updated last month
- Equal Experts Secure Delivery Playbook☆27Feb 21, 2023Updated 3 years ago
- EZGHSA is a command-line tool for summarizing and filtering vulnerability alerts on Github repositories.☆36Jan 4, 2026Updated 3 months ago
- ☆35May 13, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Threat Mitigation Strategies☆29Feb 18, 2026Updated last month
- ☆39Mar 9, 2023Updated 3 years ago
- Segment's Threat Modeling training for our engineers☆245May 4, 2021Updated 4 years ago
- goSDL☆521Nov 3, 2025Updated 5 months ago
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Jan 18, 2022Updated 4 years ago
- Snyk Node Runtime Agent☆16Apr 12, 2022Updated 4 years ago
- threatspec - continuous threat modeling, through code☆383Dec 30, 2020Updated 5 years ago
- DEPRECATED - web security checklist for Firefox Services☆78Jan 6, 2021Updated 5 years ago
- InfoSec OpenAI Examples☆19Nov 26, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagrams☆107Jan 30, 2025Updated last year
- A Pythonic framework for threat modeling☆1,122Updated this week
- A curated list of threat modeling resources (Books, courses - free and paid, videos, tools, tutorials and workshops to practice on ) for …☆1,741Aug 2, 2024Updated last year
- Node application to help managing Maturity Models like the ones created by BSIMM and OpenSAMM☆195Aug 27, 2018Updated 7 years ago
- ☆18Jul 30, 2024Updated last year
- Demos for several kubernetes security features☆64Jan 9, 2025Updated last year
- A Continuous Threat Modeling methodology☆327Jun 24, 2022Updated 3 years ago
- Draw.io libraries for threat modeling diagrams☆788Nov 12, 2020Updated 5 years ago
- Wrap radamsa on OSX, add instrumentation / triage.☆15Apr 22, 2016Updated 9 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A set of vulnerable Golang programs☆179Jul 5, 2023Updated 2 years ago
- Kantega Web Application Security Hero Challenge☆19Dec 3, 2020Updated 5 years ago
- -notes and scripts for online course OffIOT☆12Jan 19, 2026Updated 2 months ago
- A simple web app that helps developers understand the ASVS requirements. Now supporting ASVS 5.0☆164Nov 25, 2025Updated 4 months ago
- AppSecPipeline Specification for DevOps automation.☆40Dec 8, 2022Updated 3 years ago
- ☆125Nov 8, 2023Updated 2 years ago
- Listo. Use questionnaires and checklists to make it easy to do the right thing, regarding the software you build.☆28Apr 7, 2023Updated 3 years ago
- 🖇️ equivalence table between OWASP ASVS standard and STRIDE threat modeling methodology.☆76Aug 22, 2024Updated last year
- Repository for the Open Information Security Risk Universe☆64Jul 10, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Spotter is a comprehensive Kubernetes security scanner that uses CEL-based rules to identify security vulnerabilities, misconfigurations,…☆75Sep 13, 2025Updated 7 months ago
- A tool to investigate Dependency Confusion in Artifactory☆24May 15, 2025Updated 11 months ago
- A comprehensive checklist and guide for organizations looking to implement a robust cybersecurity program☆47Feb 2, 2026Updated 2 months ago
- Exploit CVE-2021-25735: Kubernetes Validating Admission Webhook Bypass☆17Apr 23, 2021Updated 4 years ago
- A colour-coded radar chart to keep track of technologies in use, whether they are being evaluated, adopted or phased out.☆14Jan 6, 2021Updated 5 years ago
- Materials used by Product Management and Product Marketing☆12Aug 5, 2018Updated 7 years ago
- Jumpstart multiple WebSocket servers quickly☆33Nov 23, 2021Updated 4 years ago