-
Updated
Nov 27, 2020
#
threat-modeling
Here are 77 public repositories matching this topic...
How to systematically secure anything: a repository about security engineering
security
threat-modeling
secure-design
security-architecture
security-engineering
secure-systems
security-assurance
A curated list of threat modeling resources (Books, courses - free and paid, videos, tools, tutorials and workshops to practice on ) for learning Threat modeling and initial phases of security review.
awesome
awesome-list
threat-modeling
appsec
devsecops
security-review
practical-devsecops
devsecops-university
-
Updated
Nov 24, 2021 - Dockerfile
Draw.io libraries for threat modeling diagrams
-
Updated
Nov 12, 2020
Agile Threat Modeling Toolkit
security
agile
risk-analysis
docker-container
architecture
infosec
cicd
threat-modeling
risk-management
devsecops
threagile
-
Updated
Nov 21, 2021 - Go
This project is about creating and publishing threat model examples.
-
Updated
Nov 10, 2021 - Python
An open source, online threat modeling tool from OWASP
-
Updated
Feb 1, 2022 - JavaScript
Personal compilation of APT malware from whitepaper releases, documents and own research
collection
malware
threat-hunting
malware-analysis
malware-research
threat-sharing
threat-modeling
yara-rules
threat-intelligence
malware-detection
-
Updated
Feb 7, 2019
A Continuous Threat Modeling methodology
-
Updated
Jun 16, 2021
This repo contains logstash of various honeypots
data-science
logstash
honeypot
samples
dataset
malware-research
threatintel
threat-modeling
threat-intelligence
-
Updated
Feb 27, 2020
vasiliscysec
commented
Sep 21, 2021
Expected behaviour
Actual behaviour
Steps to reproduce the behaviour
Version of CAIRIS
Details of browser or, if applicable, details of the OS used to host CAIRIS
Desktop variant of OWASP Threat Dragon
-
Updated
Jul 8, 2021
a curated list of useful threat modeling resources
-
Updated
Nov 30, 2020
S2AN - Mapper of Sigma/Suricata Rules/Signatures ➡️ MITRE ATT&CK Navigator
-
Updated
Jul 8, 2021 - C#
Templates for the Microsoft Threat Modeling Tool
-
Updated
Dec 29, 2019
security
devops
security-audit
books
agile
book
hacking
people
infosec
threat-modeling
physical
physical-test
websecurity
devsecops
social-engineering
people-test
physical-security
people-security
security-review
security-testing
-
Updated
Jan 14, 2021
ChristophNiehoff
commented
Oct 29, 2021
After every player has passed, but before a new card has been drawn, the "Remove Threat" button is still clickable.
The UI suggests that everything is ok, but the threat does not get removed in this corner case.
I believe it is due to
if (hasPlayerPassed(G, ctx) || (threat.owner !== ctx.playerID)) {
return INVALID_MOVE;
}
in deleteThreats()
in moves.js
. One is still at
OWASP Threat Dragon core files
-
Updated
May 15, 2021
The Open Security Summit 2020 is focused on the collaboration between, Developers and Application Security
-
Updated
Oct 3, 2020 - Jupyter Notebook
A place for documenting threats and mitigations related to containers orchestrators (Kubernetes, Swarm etc)
-
Updated
Jul 3, 2018 - Gherkin
The Open Security Summit 2021 is focused on the collaboration between, Developers and Application Security
-
Updated
Jan 27, 2022 - Jupyter Notebook
Threat Model analysis for MARA modular robot
-
Updated
Sep 3, 2019
Attack Tree modeling sheet for Dia
-
Updated
Oct 9, 2018
A collection of awesome software, libraries, learning tutorials, documents and books, technical resources and cool stuff about Red Team in Cybersecurity.
cybersecurity
penetration-testing
technical-analysis
threat-modeling
red-team
security-tools
threat-intelligence
security-vulnerability-assessment
blue-team
red-teaming
red-teams
penetration-resistance-modeling
-
Updated
Jan 27, 2022
A curated threat modeling library collection
devops
risk-analysis
azure
architecture
compliance
automotive
threat-modeling
risk-assessment
information-security
automotive-security
dread
risk-modelling
stride
information-security-research
-
Updated
Oct 6, 2018
A Java library for programmatically calculating OWASP Risk Rating scores
-
Updated
Dec 22, 2021 - Java
android
iot
security
devops
security-audit
mobile
books
book
hacking
infosec
threat-modeling
mobile-security
iot-security
devsecops
security-review
security-testing
iot-testing
iot-security-testing
mobile-security-testing
-
Updated
Aug 2, 2019
DFD diagramming sheet for Dia
-
Updated
Oct 9, 2018
redshiftzero
opened
Feb 8, 2020
OWASP Ontology-driven Threat Modelling framework
-
Updated
Dec 9, 2021 - Java
Improve this page
Add a description, image, and links to the threat-modeling topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the threat-modeling topic, visit your repo's landing page and select "manage topics."
"AA03": { "description": "Weakness in SSO Authorization", "source": (Process, Element), "target": (Process, Server), "condition": "target.implementsAuthenticationScheme is False", },
What if the Process implements BasicAuth or uses mutual TLS (neither of which is SSO)?
If the Process uses SAML or OAuth, then maybe.
Maybe authenticationScheme as a string var is neces