There are 17 repositories under threat-modeling topic.
How to systematically secure anything: a repository about security engineering
7 Lessons, Kick-start Your Cybersecurity Learning.
A curated list of threat modeling resources (Books, courses - free and paid, videos, tools, tutorials and workshops to practice on ) for learning Threat modeling and initial phases of security review.
An open source threat modeling tool from OWASP
Draw.io libraries for threat modeling diagrams
This project is about creating and publishing threat model examples.
A simple threat modeling tool to help humans to reduce time-to-value when threat modeling
Collection of Threat Models
A Continuous Threat Modeling methodology
Personal compilation of APT malware from whitepaper releases, documents and own research
This repo contains logstash of various honeypots
The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.
Computer Aided Integration of Requirements and Information Security - Server
Templates for the Microsoft Threat Modeling Tool
An online multiplayer version of the Elevation of Privilege (EoP) threat modeling card game
a curated list of useful threat modeling resources
A curated list of security card games.
Desktop variant of OWASP Threat Dragon
An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources about Red Team (Offensive) in Cybersecurity.
Curating Falco rules with MITRE ATT&CK Matrix
🔦 STRIDE vs ASVS equivalence table
SysEye是一个window上的基于att&ck现代EDR设计**的威胁响应工具.有效检测常见的未知威胁与已知威胁.防守方的利剑
An online multiplayer version of the threat modeling card games: Elevation of Privilege (EoP), OWASP Cornucopia and OWASP Cumulus.
Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. Sugar-Free and Secure: no any external dependencies except for chart plotting are used
:books: Overview :lock: Tooling :lock: Process :lock: Physical :lock: People :books:
The Open Security Summit is focused on the collaboration between, Developers and Application Security
A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense
OWASP Threat Dragon core files
AI featured threat modeling and security review action
Collection of my presentations on various topics like application security, python, cloud security, DevSecOps and so on...