threat-modeling
There are 197 repositories under threat-modeling topic.
veeral-patel/how-to-secure-anything
How to systematically secure anything: a repository about security engineering
microsoft/Security-101
8 Lessons, Kick-start Your Cybersecurity Learning.
hysnsec/awesome-threat-modelling
A curated list of threat modeling resources (Books, courses - free and paid, videos, tools, tutorials and workshops to practice on ) for learning Threat modeling and initial phases of security review.
OWASP/threat-dragon
An open source threat modeling tool from OWASP
OWASP/pytm
A Pythonic framework for threat modeling
michenriksen/drawio-threatmodeling
Draw.io libraries for threat modeling diagrams
Threagile/threagile
Agile Threat Modeling Toolkit
awslabs/threat-composer
A simple threat modeling tool to help humans to reduce time-to-value when threat modeling
TalEliyahu/Threat_Model_Examples
A collection of real-world threat model examples across various technologies, providing practical insights into identifying and mitigating security risks.
OWASP/threat-model-cookbook
This project is about creating and publishing threat model examples.
Autodesk/continuous-threat-modeling
A Continuous Threat Modeling methodology
klarna-incubator/gram
Gram is Klarna's own threat model diagramming tool
sapphirex00/Threat-Hunting
Personal compilation of APT malware from whitepaper releases, documents and own research
Repello-AI/Agent-Wiz
A CLI tool for threat modeling and visualizing AI agents built using popular frameworks like LangGraph, AutoGen, CrewAI, and more.
iriusrisk/OpenThreatModel
The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.
0xsha/sweetie-data
This repo contains logstash of various honeypots
AzureArchitecture/threat-model-templates
Templates for the Microsoft Threat Modeling Tool
cairis-platform/cairis
Computer Aided Integration of Requirements and Information Security - Server
dehydr8/elevation-of-privilege
An online multiplayer version of the Elevation of Privilege (EoP) threat modeling card game
yevh/TaaC-AI
AI-driven Threat modeling-as-a-Code (TaaC-AI)
awslabs/threat-designer
Threat Designer is a GenerativeAI application designed to automate and streamline the threat modeling process for secure system design.
Karneades/awesome-security-card-games
A curated list of security card games.
redshiftzero/awesome-threat-modeling
a curated list of useful threat modeling resources
mthcht/ThreatIntel-Reports
Raw data from Threat Intelligence Reports with automatic reports collection and keyword search across thousands of reports
Kwangsa19/Ketmanto-Cybersecurity-Portfolio
I developed a rigorous cybersecurity project portfolio on mock clients covering NIST, audits, Linux, SQL, assets, threats, vulnerabilities, detection, incident response, escalation, Wireshark, tcpdump, IDS (Suricata), SIEM (Splunk, Chronicle), and Python automation.
nutonomy/AVCDL
This repository contains material related to A Versatile Cybersecurity Development Lifecycle (AVCDL)
tidalcyber/cyber-threat-profiling
A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense
paulveillard/cybersecurity-red-team
An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources about Red Team (Offensive) in Cybersecurity.
3CORESec/S2AN
S2AN - Mapper of Sigma/Suricata Rules/Signatures ➡️ MITRE ATT&CK Navigator
CloudDefenseAI/falco_extended_rules
Curating Falco rules with MITRE ATT&CK Matrix
OWASP/threat-dragon-desktop
Desktop variant of OWASP Threat Dragon
mllamazares/STRIDE-vs-ASVS
🖇️ STRIDE vs. ASVS equivalence table
OWASP/cornucopia
The source files and tools needed to build the OWASP Cornucopia decks in various languages
TNG/elevation-of-privilege
An online multiplayer version of the threat modeling card games: Elevation of Privilege (EoP), OWASP Cornucopia, OWASP Cumulus, and Elevation of MLsec.
nxenon/DevSecOps
♾️ Collection of DevSecOps Notes + Resources + Courses + Tools
rusakovichma/TicTaaC
Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. Sugar-Free and Secure: no any external dependencies except for chart plotting are used