w8mej / Threat_Modeling_BankLinks
A curated threat modeling library collection
☆22Updated last year
Alternatives and similar repositories for Threat_Modeling_Bank
Users that are interested in Threat_Modeling_Bank are comparing it to the libraries listed below
Sorting:
- Welcome to OpenDevSecOps! Our mission is to deliver highly-resilient, readily-available and free defensive and offensive devops security …☆21Updated 6 years ago
- OWASP Threat Dragon with Gitlab Integration☆27Updated 7 years ago
- This repository is a curated list of pro bono incident response entities.☆21Updated 2 years ago
- Tools for AWS forensics☆63Updated 9 years ago
- Legal, procedural and policies document templates for operating an IRT☆64Updated last year
- CI Pipeline with Pixi, the WAF OWASP Core Rule Set and TestCafe tests.☆15Updated 4 years ago
- A Java library for programmatically calculating OWASP Risk Rating scores☆18Updated 2 years ago
- A static website template for security pages.☆52Updated 3 months ago
- Collection of best practices to add OSINT into MISP and/or MISP communities☆66Updated 2 years ago
- Presentations, training modules, and other education materials from Duo Security's Application Security team.☆77Updated 4 years ago
- Privacy Cards for Software Developers☆53Updated 6 years ago
- All-in-one tool for managing vulnerability reports from AppSec pipelines☆108Updated 2 years ago
- Docker container for datasploit framework☆26Updated 8 years ago
- Please use https://github.com/veeral-patel/true-positive instead☆69Updated 2 years ago
- Best practices in threat intelligence☆48Updated 2 years ago
- OWASP Foundation Web Respository☆29Updated 3 weeks ago
- Core incident handling plugins for aws_ir cli, incident pony, and more.☆21Updated 7 years ago
- DefectDojo Documentation☆17Updated 4 years ago
- Python API for the CVSS v3☆58Updated 4 years ago
- threat-intelligence.eu website and repository of information about open standards, documents, methodologies and processes in threat intel…☆49Updated 2 months ago
- An auxiliary spellcheck dictionary that corresponds with the Bishop Fox Cybersecurity Style Guide☆91Updated 2 years ago
- Python module for evaluation of AWS account best practices around incident handling readieness.☆55Updated 5 years ago
- Indices for courses in SANS' Network Security Operations curriculum☆16Updated 9 years ago
- Materials used and mentioned during my talk at SANS Cloud Security Summit 2018 in San Diego☆23Updated 7 years ago
- Potiron - Normalize, Index and Visualize Network Capture☆87Updated 6 years ago
- NCC Group Template for the Microsoft Threat Modeling Tool 2016 for Automotive Security☆49Updated 5 years ago
- A Crowdsourcing Exchange for mapping various sources of security vulnerabilities, exposures, threats, and controls data☆27Updated 6 years ago
- ☆30Updated 6 years ago
- ☆67Updated 8 years ago
- Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.☆13Updated last year