w8mej / Threat_Modeling_BankLinks
A curated threat modeling library collection
☆22Updated last year
Alternatives and similar repositories for Threat_Modeling_Bank
Users that are interested in Threat_Modeling_Bank are comparing it to the libraries listed below
Sorting:
- Welcome to OpenDevSecOps! Our mission is to deliver highly-resilient, readily-available and free defensive and offensive devops security …☆21Updated 6 years ago
- OWASP Threat Dragon with Gitlab Integration☆27Updated 7 years ago
- OWASP Threat Dragon core files☆28Updated 4 years ago
- Privacy Cards for Software Developers☆53Updated 6 years ago
- A Java library for programmatically calculating OWASP Risk Rating scores☆18Updated 2 years ago
- OWASP Foundation Web Respository☆28Updated last week
- All-in-one tool for managing vulnerability reports from AppSec pipelines☆106Updated 2 years ago
- A static website template for security pages.☆52Updated 2 weeks ago
- Legal, procedural and policies document templates for operating an IRT☆64Updated last year
- A Crowdsourcing Exchange for mapping various sources of security vulnerabilities, exposures, threats, and controls data☆27Updated 6 years ago
- Tools for AWS forensics☆63Updated 9 years ago
- CI Pipeline with Pixi, the WAF OWASP Core Rule Set and TestCafe tests.☆15Updated 4 years ago
- Global Security Database Tools☆43Updated last year
- Core incident handling plugins for aws_ir cli, incident pony, and more.☆21Updated 7 years ago
- Indices for courses in SANS' Network Security Operations curriculum☆16Updated 9 years ago
- DefectDojo Documentation☆17Updated 3 years ago
- Please use https://github.com/veeral-patel/true-positive instead☆68Updated 2 years ago
- Python module for evaluation of AWS account best practices around incident handling readieness.☆55Updated 5 years ago
- ☆30Updated 6 years ago
- This repository is a curated list of pro bono incident response entities.☆20Updated 2 years ago
- Collection of information security policies.☆29Updated 8 years ago
- Desktop variant of OWASP Threat Dragon☆77Updated 4 years ago
- Collection of best practices to add OSINT into MISP and/or MISP communities☆66Updated last year
- Remote / Onsite Security Assessment Jumpkit☆39Updated 2 years ago
- Docker container for datasploit framework☆26Updated 8 years ago
- Vulnerability Management tool using the CVE-Search database☆10Updated 9 years ago
- NCC Group Template for the Microsoft Threat Modeling Tool 2016 for Automotive Security☆48Updated 5 years ago
- Traceroute improved wrapper for CSIRT and CERT operators☆38Updated 9 months ago
- A packer utility to create and capture DFIR Image for use AWS & Azure☆15Updated 5 years ago
- Vendor Security Model Contract☆98Updated 3 years ago