☆55Nov 15, 2017Updated 8 years ago
Alternatives and similar repositories for ADTool2
Users that are interested in ADTool2 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An attack tree generator built on electron☆62May 23, 2016Updated 9 years ago
- Deterministic and monitored traffic generation for inspecting and and training traffic models☆12Nov 19, 2024Updated last year
- Attack Tree modeling sheet for Dia☆20Oct 9, 2018Updated 7 years ago
- ☆11Sep 23, 2025Updated 6 months ago
- MulVAL interaction rules and their mapping to MITRE ATT&CK Techniques☆13Oct 21, 2024Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A commandline tool that wraps the Archerysec REST API for controlling Archery and executing quick, targeted scans.☆11May 30, 2024Updated last year
- ☆22Jan 6, 2022Updated 4 years ago
- A simple website for previewing WebAuthn attestations and assertions☆17Sep 30, 2025Updated 5 months ago
- GitHub action to run Threagile, the agile threat modeling toolkit, on a repo's threagile.yaml file☆14May 3, 2024Updated last year
- Open Threat Modeling Template☆52Jul 10, 2024Updated last year
- ☆10May 30, 2015Updated 10 years ago
- ☆14Jul 17, 2018Updated 7 years ago
- Automatically exported from code.google.com/p/scapy-guide☆13Jun 15, 2015Updated 10 years ago
- "Linking Threat Tactics, Techniques, and Patterns with Defensive Weaknesses, Vulnerabilities and Affected Platform Configurations for Cyb…☆106Nov 9, 2025Updated 4 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- OWASP Threat Dragon core files☆29May 15, 2021Updated 4 years ago
- The original code for SCARA: Scalable Graph Neural Networks with Feature-Oriented Optimization (VLDB 2022) and Scalable Decoupling Graph …☆13Mar 8, 2024Updated 2 years ago
- ☆15Sep 20, 2019Updated 6 years ago
- Small Python-based web application honeypot with built-in analysis tools.☆12Sep 15, 2019Updated 6 years ago
- This work shows the viability of automatically generated attack graphs that are used for adversary behavior execution in industrial contr…☆12Jun 3, 2021Updated 4 years ago
- Bunch of honey related items that spoof/decoy powersploit functions.☆18Apr 23, 2020Updated 5 years ago
- improve mulval to accommodate some updates and make it more suitable for industrial control network☆12Nov 22, 2022Updated 3 years ago
- NHS App Fido Client for Android☆13Feb 16, 2021Updated 5 years ago
- A PoC script for reading and writing HID iClass credentials using an iClass RW device over serial☆15May 12, 2014Updated 11 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- RASSH – Reinforced Adaptive SSH Honeypot This is a project developed for my Phd Thesis and the target is to create an Adaptive Honeypot…☆12Jul 29, 2019Updated 6 years ago
- OpenStreetMap indoor mapping browser☆37Jul 2, 2014Updated 11 years ago
- OWASP Threat Dragon with Gitlab Integration☆27Nov 6, 2017Updated 8 years ago
- CRUSOE: A Toolset for Cyber Situational Awareness and Decision Support in Incident Handling Inspired by the OODA Loop☆15Dec 11, 2024Updated last year
- Factored Interactive POMDP solver based on symbolic Perseus.☆11Aug 12, 2025Updated 7 months ago
- this will be used for attack graph engine MulVAL to evaluate risk assessment results for different network topologies.☆12Feb 23, 2016Updated 10 years ago
- ☆33Jan 28, 2021Updated 5 years ago
- ☆14May 20, 2016Updated 9 years ago
- Tools to pull data from HID iClass readers☆18Nov 9, 2012Updated 13 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- software pkcs11 implementation☆31Feb 4, 2019Updated 7 years ago
- ☆14Jul 14, 2018Updated 7 years ago
- A Go library for MLS☆31Dec 28, 2025Updated 3 months ago
- Sniffs an interface/pcap file and concatenates fragmented packet loads☆22Feb 26, 2015Updated 11 years ago
- OWASP Foundation Web Respository☆20Oct 8, 2025Updated 5 months ago
- ☆20Apr 10, 2025Updated 11 months ago
- An SDN based security system for Botnet based DDoS attacks.☆15Jul 28, 2015Updated 10 years ago