-
Updated
Jun 7, 2020
#
threat-modeling
Here are 49 public repositories matching this topic...
How I'm learning to build secure systems
threat-modeling
secure-design
security-architecture
security-engineering
secure-systems
security-assurance
Draw.io libraries for threat modeling diagrams
-
Updated
Sep 29, 2019
Personal compilation of APT malware from whitepaper releases, documents and own research
collection
malware
threat-hunting
malware-analysis
malware-research
threat-sharing
threat-modeling
yara-rules
threat-intelligence
malware-detection
-
Updated
Feb 7, 2019
web-based OSINT and reconaissance toolkit
-
Updated
Aug 21, 2019 - Python
This repo contains logstash of various honeypots
data-science
logstash
honeypot
samples
dataset
malware-research
threatintel
threat-modeling
threat-intelligence
-
Updated
Feb 27, 2020
A curated list of threat modeling resources (Books, courses - free and paid, videos, tools, tutorials and workshops to practice on ) for learning Threat modeling and initial phases of security review.
awesome
awesome-list
threat-modeling
appsec
devsecops
security-review
practical-devsecops
devsecops-university
-
Updated
Apr 14, 2020 - Dockerfile
Open
Create disclaimer
jmarcil
commented
Aug 1, 2019
We need to add some text in the readme that says that examples in this repo are not examples of good systems, but rather contains bad insecure systems that are easy to model.
Same goes with the threat models examples, most of them will actually be ok, but models should be used as examples and tailed to the particular needs of the viewer context and reality.
(maybe put this as DISCLAIMER.
A Continuous Threat Modeling methodology
-
Updated
Oct 14, 2019
Computer Aided Integration of Requirements and Information Security
mysql
python
graphviz
security
risk-analysis
ux
architecture
usability
risk-models
threat-modeling
architectural-patterns
requirements-management
usability-usable-security
requirements
personas
cairis
attack-patterns
-
Updated
Jun 1, 2020 - Python
security
devops
security-audit
books
agile
book
hacking
people
infosec
threat-modeling
physical
physical-test
websecurity
devsecops
social-engineering
people-test
physical-security
people-security
security-review
security-testing
-
Updated
Aug 2, 2019
Sigma2AttackNet - Mapper of Sigma Rules ➡️ MITRE ATT&CK
-
Updated
Jun 6, 2020 - C#
a curated list of useful threat modeling resources
-
Updated
Jun 30, 2019
A place for documenting threats and mitigations related to containers orchestrators (Kubernetes, Swarm etc)
-
Updated
Jul 3, 2018 - Gherkin
Threat Model analysis for MARA modular robot
-
Updated
Sep 3, 2019
Templates for the Microsoft Threat Modeling Tool
-
Updated
Dec 29, 2019
Attack Tree modeling sheet for Dia
-
Updated
Oct 9, 2018
A Java library for programmatically calculating OWASP Risk Rating scores
-
Updated
May 18, 2020 - Java
A curated threat modeling library collection
devops
risk-analysis
azure
architecture
compliance
automotive
threat-modeling
risk-assessment
information-security
automotive-security
dread
risk-modelling
stride
information-security-research
-
Updated
Oct 6, 2018
An online multiplayer version of the Elevation of Privilege (EoP) threat modeling card game
-
Updated
May 29, 2020 - JavaScript
Looks up details on a public IPV4 address against ip-info and blacklist-search sites. Providing a quick reputation lookup for an analyst.
python
security
ipv4
ip
reputation
badip
threatintel
threat-modeling
iplookup
reputation-api
threat-analysis
blueteam
security-tools
threat-intelligence
python-badip
-
Updated
Mar 21, 2019 - Python
DFD diagramming sheet for Dia
-
Updated
Oct 9, 2018
android
iot
security
devops
security-audit
mobile
books
book
hacking
infosec
threat-modeling
mobile-security
iot-security
devsecops
security-review
security-testing
iot-testing
iot-security-testing
mobile-security-testing
-
Updated
Aug 2, 2019
A Python SDK for foreseeti's securiCAD Vanguard
-
Updated
May 11, 2020 - Python
The repository links to the collection of repositories that performs various Software Vulnerability Analysis and Exploits using different tools and methods.
reverse-engineering
buffer-overflow-attack
threat-modeling
vulnerability-analysis
format-string-attack
software-vulnerabilities
-
Updated
Apr 13, 2020
Threat modeling of an open-source VPN Client - OpenConnect using Microsoft Threat Modeling Tool
-
Updated
Apr 12, 2020
-
Updated
Mar 7, 2020
Swiftype Threat Modelling and Risk Assessment Assets
-
Updated
Nov 29, 2017
Threat Modeling Tool Extension for Penetration Tester (TMTe4PT)
-
Updated
Feb 20, 2019 - HTML
Improve this page
Add a description, image, and links to the threat-modeling topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the threat-modeling topic, visit your repo's landing page and select "manage topics."
When drawing a DFD I will often group things logically on the diagram, different local file datastores might be together as are external services out of scope, various AWS services etc. Currently the diagram is draw with things in random places. Using a Boundary would accomplish this but in some cases there isn't a boundary.
I was thinking it may be useful to have a logical group similar to a B