w8mej / Threat_Modeling_BankLinks
A curated threat modeling library collection
☆22Updated last year
Alternatives and similar repositories for Threat_Modeling_Bank
Users that are interested in Threat_Modeling_Bank are comparing it to the libraries listed below
Sorting:
- OWASP Threat Dragon with Gitlab Integration☆27Updated 7 years ago
- Welcome to OpenDevSecOps! Our mission is to deliver highly-resilient, readily-available and free defensive and offensive devops security …☆21Updated 6 years ago
- This repository is a curated list of pro bono incident response entities.☆21Updated 2 years ago
- Tools for AWS forensics☆63Updated 9 years ago
- A Java library for programmatically calculating OWASP Risk Rating scores☆18Updated 2 years ago
- DefectDojo Documentation☆17Updated 4 years ago
- Pythonic interface to the Internet Storm Center / DShield API.☆28Updated 2 years ago
- OWASP Threat Dragon core files☆29Updated 4 years ago
- Collection of information security policies.☆29Updated 8 years ago
- All-in-one tool for managing vulnerability reports from AppSec pipelines☆108Updated 2 years ago
- Docker container for datasploit framework☆26Updated 8 years ago
- OWASP Foundation Web Respository☆28Updated last week
- This repository shows the prompts we used for each agent in CVE-Genie☆23Updated 4 months ago
- Python module for evaluation of AWS account best practices around incident handling readieness.☆55Updated 5 years ago
- Ansible module for OWASP ZAP using Python API to scan web targets for security issues☆14Updated 7 years ago
- Core incident handling plugins for aws_ir cli, incident pony, and more.☆22Updated 7 years ago
- Web based analysis platform for use with the AWS_IR command line tool.☆17Updated 9 years ago
- CI Pipeline with Pixi, the WAF OWASP Core Rule Set and TestCafe tests.☆15Updated 4 years ago
- A curated list of tools for incident response☆31Updated last year
- A static website template for security pages.☆53Updated 2 months ago
- A packer utility to create and capture DFIR Image for use AWS & Azure☆15Updated 5 years ago
- Privacy Cards for Software Developers☆53Updated 6 years ago
- A collection of useful scripts for penetration testers☆83Updated 12 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆14Updated 7 years ago
- Legal, procedural and policies document templates for operating an IRT☆64Updated last year
- Run DependencyCheck Against Your Orgs GitHub Repos.☆14Updated 7 years ago
- A Heroku-based web honeypot that can be used to create and monitor fake HTTP endpoints (i.e. honeytokens).☆64Updated 6 years ago
- An auxiliary spellcheck dictionary that corresponds with the Bishop Fox Cybersecurity Style Guide☆87Updated 2 years ago
- A Crowdsourcing Exchange for mapping various sources of security vulnerabilities, exposures, threats, and controls data☆27Updated 6 years ago
- Collection of best practices to add OSINT into MISP and/or MISP communities☆66Updated 2 years ago