w8mej / Threat_Modeling_BankLinks
A curated threat modeling library collection
☆22Updated last year
Alternatives and similar repositories for Threat_Modeling_Bank
Users that are interested in Threat_Modeling_Bank are comparing it to the libraries listed below
Sorting:
- OWASP Threat Dragon with Gitlab Integration☆27Updated 7 years ago
- Welcome to OpenDevSecOps! Our mission is to deliver highly-resilient, readily-available and free defensive and offensive devops security …☆21Updated 6 years ago
- This repository is a curated list of pro bono incident response entities.☆21Updated 2 years ago
- Legal, procedural and policies document templates for operating an IRT☆64Updated last year
- A Java library for programmatically calculating OWASP Risk Rating scores☆18Updated 2 years ago
- Indices for courses in SANS' Network Security Operations curriculum☆16Updated 9 years ago
- CI Pipeline with Pixi, the WAF OWASP Core Rule Set and TestCafe tests.☆15Updated 4 years ago
- Privacy Cards for Software Developers☆53Updated 6 years ago
- ☆30Updated 6 years ago
- OWASP Threat Dragon core files☆28Updated 4 years ago
- A Crowdsourcing Exchange for mapping various sources of security vulnerabilities, exposures, threats, and controls data☆27Updated 6 years ago
- Pythonic interface to the Internet Storm Center / DShield API.☆28Updated 2 years ago
- Remote / Onsite Security Assessment Jumpkit☆39Updated 2 years ago
- Core incident handling plugins for aws_ir cli, incident pony, and more.☆21Updated 7 years ago
- DefectDojo Documentation☆17Updated 3 years ago
- Presentations, training modules, and other education materials from Duo Security's Application Security team.☆75Updated 4 years ago
- Materials for the BSides NoVA/Charleston 2018 Bro Workshop☆14Updated 2 months ago
- A packer utility to create and capture DFIR Image for use AWS & Azure☆15Updated 5 years ago
- Project intended to make Attack Maps part of software development by reducing the time it takes to complete them.☆48Updated 8 years ago
- All-in-one tool for managing vulnerability reports from AppSec pipelines☆108Updated 2 years ago
- Python module for evaluation of AWS account best practices around incident handling readieness.☆55Updated 5 years ago
- Collection of information security policies.☆29Updated 8 years ago
- Potiron - Normalize, Index and Visualize Network Capture☆88Updated 6 years ago
- ☆16Updated 8 years ago
- Materials used and mentioned during my talk at SANS Cloud Security Summit 2018 in San Diego☆23Updated 7 years ago
- Vulnerability Management tool using the CVE-Search database☆10Updated 9 years ago
- Tools for AWS forensics☆63Updated 9 years ago
- Security conferences talks☆25Updated 5 years ago
- Collection of best practices to add OSINT into MISP and/or MISP communities☆66Updated last year
- Legal, procedural and policies document templates for operating MISP and information sharing communities☆38Updated 2 years ago