A curated threat modeling library collection
☆24Dec 1, 2023Updated 2 years ago
Alternatives and similar repositories for Threat_Modeling_Bank
Users that are interested in Threat_Modeling_Bank are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- cloud.gov security policies and procedures☆27Mar 5, 2026Updated 2 months ago
- Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.☆13Dec 1, 2023Updated 2 years ago
- Sharing Threat Hunting runbooks☆26Jul 5, 2019Updated 6 years ago
- the Open Source Windows Privilege Escalation Guide☆10Mar 16, 2017Updated 9 years ago
- Awesome List for Security Standards☆31Jul 20, 2018Updated 7 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆27Dec 6, 2013Updated 12 years ago
- ☆14Jun 28, 2017Updated 8 years ago
- AutoSecGPT is an AI-power tool that supports security teams to model threats associated with their automotive application to ease the pro…☆15Apr 28, 2025Updated last year
- Threat Modeling Tool Extension for Penetration Tester (TMTe4PT)☆12Mar 2, 2022Updated 4 years ago
- AWS Metadata Proxy for protection against SSRF☆68Mar 3, 2020Updated 6 years ago
- List of open-source software from NIST☆16Jun 15, 2020Updated 5 years ago
- Various Malware-Related Utilities☆10Aug 4, 2016Updated 9 years ago
- ☆10Feb 4, 2024Updated 2 years ago
- Automate Windows Defender STIG to 100% Compliance☆19Jul 26, 2024Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- A collection of awesome security controls mapping for solutions across frameworks.☆57Jun 1, 2020Updated 5 years ago
- Code and materials for the talk "Set practice: coding & using sets in Go"☆11Jul 8, 2025Updated 9 months ago
- Security, Compliance and Informational Dashboard System☆25May 12, 2021Updated 4 years ago
- ☆22Jul 12, 2024Updated last year
- NIST 800-53 Baseline Configuration Tool☆15Aug 23, 2024Updated last year
- ☁️Haven GRC - easier governance, risk, and compliance 👨⚕️👮♀️🦸♀️🕵️♀️👩🔬☆105Jun 14, 2021Updated 4 years ago
- Remotely collect linux live forensics artifacts.☆14Jul 8, 2022Updated 3 years ago
- ☆13Apr 16, 2016Updated 10 years ago
- Welcome to OpenDevSecOps! Our mission is to deliver highly-resilient, readily-available and free defensive and offensive devops security …☆21Jan 29, 2019Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆10Jun 27, 2023Updated 2 years ago
- Pulled the H-1 Table from the NIST SP 800-53 Rev. 4. Table maps applicable NIST controls to the ISO/IEC 27001 Controls☆20Aug 5, 2019Updated 6 years ago
- Download all Notion notes in markdown and optionally back them up to a git repository.☆21Jan 24, 2021Updated 5 years ago
- Parser of ssh public and private keys☆12Apr 7, 2020Updated 6 years ago
- Config files for my GitHub profile.☆19Updated this week
- OWASP Threat Dragon with Gitlab Integration☆27Nov 6, 2017Updated 8 years ago
- The Oro Operating System official repository☆27Mar 14, 2025Updated last year
- Machine readable cybersecurity compliance standards library for Python, starting with FISMA and NIST Risk Management Framework☆63Apr 15, 2020Updated 6 years ago
- fenris - program execution path analysis tool☆29Feb 19, 2014Updated 12 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- bindings.☆14Feb 17, 2018Updated 8 years ago
- Legal, procedural and policies document templates for operating MISP and information sharing communities☆38Jan 31, 2023Updated 3 years ago
- Umbrella project for various ESP8266 programs☆15Aug 16, 2018Updated 7 years ago
- ☆15Jan 3, 2018Updated 8 years ago
- Multithreading search through Bitbucket git repositories for sensitive data (see TruffleHog/regexChecks.py), digging deep into commit his…☆17Mar 21, 2018Updated 8 years ago
- Stealth is a File Integrity scanner performing its work in a stealthy way.☆12Jun 25, 2018Updated 7 years ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆13Apr 18, 2020Updated 6 years ago