stevespringett / threatmodel-sdkView external linksLinks
A Java library for parsing and programmatically using threat models
☆82Feb 15, 2023Updated 2 years ago
Alternatives and similar repositories for threatmodel-sdk
Users that are interested in threatmodel-sdk are comparing it to the libraries listed below
Sorting:
- Open Threat Modeling Template☆52Jul 10, 2024Updated last year
- ☆15Jul 9, 2020Updated 5 years ago
- This is a working copy of the OWASP Project Handbook and is the draft where changes are made before publishing a final version on the OWA…☆18Feb 22, 2017Updated 8 years ago
- Checklist intended to be used as a baseline for assessing, designing, and testing the security of a MAM (Application Wrapping) solution☆20Sep 2, 2015Updated 10 years ago
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆68Jun 25, 2025Updated 7 months ago
- Small Node CLI tool to extract active contributors on repos and orgs☆10Dec 6, 2022Updated 3 years ago
- An application to assist in the organization and prioritization of software security activities.☆139Jun 10, 2021Updated 4 years ago
- Equal Experts Secure Delivery Playbook☆26Feb 21, 2023Updated 2 years ago
- ☆25Mar 28, 2018Updated 7 years ago
- Node application to help managing Maturity Models like the ones created by BSIMM and OpenSAMM☆195Aug 27, 2018Updated 7 years ago
- This web based application enables developers to quickly unit test individual API calls for both Incapsula and SecureSphere, as well as p…☆19Sep 12, 2023Updated 2 years ago
- ☆14Dec 3, 2022Updated 3 years ago
- Implementation of the SOA Repository Artifact Model and Protocol (S-RAMP)☆17Dec 1, 2016Updated 9 years ago
- A Continuous Threat Modeling methodology☆324Jun 24, 2022Updated 3 years ago
- Pin designs for security related items☆37May 10, 2024Updated last year
- SAMM stands for Software Assurance Maturity Model.☆398May 17, 2022Updated 3 years ago
- V1.0☆15Aug 8, 2016Updated 9 years ago
- Externalize Java application access to protected resources as log messages.☆43Jan 22, 2026Updated 3 weeks ago
- IriusRisk Community☆71Sep 5, 2023Updated 2 years ago
- Scripts that we use for pentesting☆42Feb 24, 2017Updated 8 years ago
- support for embedding graphviz graphs inside markdown documents☆27Jan 16, 2010Updated 16 years ago
- code reviews to practice☆18Jul 22, 2021Updated 4 years ago
- NIST Smart Manufacturing Systems Test Bed☆18May 20, 2020Updated 5 years ago
- A Pythonic framework for threat modeling☆1,103Updated this week
- Artwork for all official ZAP swag - posters, stickers, t-shirts etc☆14Mar 7, 2024Updated last year
- Robot Framework Library for popular Open Source Port Scanner and Vulnerability Scanner, Nmap☆18Jul 16, 2023Updated 2 years ago
- An open source, online threat modelling tool from OWASP☆484Jul 18, 2025Updated 6 months ago
- Security Alert Decoration☆27Jul 21, 2025Updated 6 months ago
- Este repositorio é apenas um exemplo de como adicionar OWASP ZAP Actions em uma pipeline de DevOps.☆19Mar 12, 2021Updated 4 years ago
- ☆20Mar 3, 2018Updated 7 years ago
- ☆22Jan 6, 2022Updated 4 years ago
- ☆25Jun 27, 2024Updated last year
- The challenge toolbox is a small component which allows you to create, run and check new challenges locally.☆27Mar 11, 2024Updated last year
- Everything Application Security☆27Updated this week
- This application was built to help reduce the amount of time it takes to review AWS Lambda code.☆61Nov 11, 2024Updated last year
- SharePoint Security Auditor☆21Jan 16, 2016Updated 10 years ago
- Comprehensive Pivoting Framework☆20Sep 20, 2016Updated 9 years ago
- AWS risky security change detector based on EDDA.☆82Nov 21, 2018Updated 7 years ago
- Templates for the Microsoft Threat Modeling Tool☆172Aug 4, 2025Updated 6 months ago