w8mej / Threat_Modeling_Bank
A curated threat modeling library collection
☆21Updated 11 months ago
Related projects ⓘ
Alternatives and complementary repositories for Threat_Modeling_Bank
- OWASP Threat Dragon with Gitlab Integration☆24Updated 7 years ago
- Materials used by Product Management and Product Marketing☆12Updated 6 years ago
- CI Pipeline with Pixi, the WAF OWASP Core Rule Set and TestCafe tests.☆15Updated 3 years ago
- A packer utility to create and capture DFIR Image for use AWS & Azure☆14Updated 5 years ago
- This module installs and configures MISP (Malware Information Sharing Platform)☆13Updated 2 months ago
- Welcome to OpenDevSecOps! Our mission is to deliver highly-resilient, readily-available and free defensive and offensive devops security …☆21Updated 5 years ago
- OWASP Foundation Web Respository☆27Updated this week
- Following repository contains source codes used in my two Books.☆10Updated 9 years ago
- TITO is a light framework for operationalizing threat intelligence that is platform and data agnostic.☆20Updated 4 years ago
- ☆29Updated 6 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆15Updated 3 years ago
- A Crowdsourcing Exchange for mapping various sources of security vulnerabilities, exposures, threats, and controls data☆26Updated 5 years ago
- Indices for courses in SANS' Network Security Operations curriculum☆15Updated 8 years ago
- This repository is a curated list of pro bono incident response entities.☆19Updated last year
- A Java library for programmatically calculating OWASP Risk Rating scores☆18Updated last year
- A few quick recipes for those that do not have much time during the day☆21Updated 3 weeks ago
- Automated Static Analysis Framework☆10Updated 2 years ago
- ☆14Updated last year
- Vulnerability Management tool using the CVE-Search database☆10Updated 8 years ago
- DefectDojo Documentation☆15Updated 3 years ago
- Docker container for datasploit framework☆26Updated 7 years ago
- Sharing Threat Hunting runbooks☆24Updated 5 years ago
- Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.☆13Updated 11 months ago
- The FastIR Server is a Web server to schedule FastIR Collector forensics collect thanks to the FastIR Agent☆12Updated 7 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆14Updated 6 years ago
- NCC Group Template for the Microsoft Threat Modeling Tool 2016 for Automotive Security☆46Updated 4 years ago