A curated threat modeling library collection
☆24Dec 1, 2023Updated 2 years ago
Alternatives and similar repositories for Threat_Modeling_Bank
Users that are interested in Threat_Modeling_Bank are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- cloud.gov security policies and procedures☆27Mar 5, 2026Updated last month
- OSCAL SSP content for technologies shipped by Red Hat☆16Mar 2, 2023Updated 3 years ago
- Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.☆13Dec 1, 2023Updated 2 years ago
- Sharing Threat Hunting runbooks☆25Jul 5, 2019Updated 6 years ago
- the Open Source Windows Privilege Escalation Guide☆10Mar 16, 2017Updated 9 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆14Jun 28, 2017Updated 8 years ago
- ☆31Feb 24, 2014Updated 12 years ago
- networked status aggregator sees all☆14Apr 26, 2021Updated 4 years ago
- List of open-source software from NIST☆16Jun 15, 2020Updated 5 years ago
- Various Malware-Related Utilities☆10Aug 4, 2016Updated 9 years ago
- ☆22Jul 12, 2024Updated last year
- ☆17Dec 14, 2019Updated 6 years ago
- CTF Writeups☆12Feb 25, 2023Updated 3 years ago
- ☁️Haven GRC - easier governance, risk, and compliance 👨⚕️👮♀️🦸♀️🕵️♀️👩🔬☆105Jun 14, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Embedded AppSec Best Practices☆46Oct 22, 2025Updated 5 months ago
- ☆13Apr 16, 2016Updated 10 years ago
- Welcome to OpenDevSecOps! Our mission is to deliver highly-resilient, readily-available and free defensive and offensive devops security …☆21Jan 29, 2019Updated 7 years ago
- Download all Notion notes in markdown and optionally back them up to a git repository.☆20Jan 24, 2021Updated 5 years ago
- Parser of ssh public and private keys☆12Apr 7, 2020Updated 6 years ago
- Config files for my GitHub profile.☆19Updated this week
- OWASP Threat Dragon with Gitlab Integration☆27Nov 6, 2017Updated 8 years ago
- The Oro Operating System official repository☆27Mar 14, 2025Updated last year
- Machine readable cybersecurity compliance standards library for Python, starting with FISMA and NIST Risk Management Framework☆63Apr 15, 2020Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Legal, procedural and policies document templates for operating MISP and information sharing communities☆38Jan 31, 2023Updated 3 years ago
- 🇪🇺 Because it's about you and your data. (discontinued)☆10Dec 28, 2019Updated 6 years ago
- Proposta de solução do TFC em Engenharia Informática pela ESPU-UNIKIVI, 02-2018☆10Jan 9, 2021Updated 5 years ago
- Universally Unique Lexicographically Sortable Identifier for Lua☆19Mar 28, 2017Updated 9 years ago
- Scripts I have made for blue team☆16Apr 1, 2018Updated 8 years ago
- Multithreading search through Bitbucket git repositories for sensitive data (see TruffleHog/regexChecks.py), digging deep into commit his…☆17Mar 21, 2018Updated 8 years ago
- Stealth is a File Integrity scanner performing its work in a stealthy way.☆12Jun 25, 2018Updated 7 years ago
- Spring boot CRUD (Create, Read, Update, Delete) demo application with cassandra DB and API documentation using Swaager and OpenAPI UI☆11Sep 3, 2020Updated 5 years ago
- Network Tracking Database - Fork from Jonathan Yantis☆15Jul 2, 2020Updated 5 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ML research on software vulnerabilities☆18Sep 8, 2019Updated 6 years ago
- Ansible role for security standards compliance☆13Mar 6, 2019Updated 7 years ago
- How to send email with Skygear Cloud Functions☆17Dec 8, 2022Updated 3 years ago
- Security audit tool for Encrypt.to☆14May 2, 2015Updated 10 years ago
- A docker image that outputs a RUN instruction documenting the specific version dependencies for a package☆15Feb 21, 2015Updated 11 years ago
- Mapping of Binaries that allows Arbitrary Code Execution☆26May 10, 2018Updated 7 years ago
- A web application to streamline the development of STIGs from SRGs☆85Updated this week