Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
awesome-threat-modelling
https://github.com/srk810/awesome-threat-modelling
Last synced: 5 days ago
JSON representation
-
Tutorials and Blogs
-
Paid
- 7 Easy Steps For Building a Scalable Threat Modeling Process
- Where is my Threat Model?
- Why You Should Care About Threat Modelling
- Where is my Threat Model?
- Why You Should Care About Threat Modelling
- Where is my Threat Model?
- Why You Should Care About Threat Modelling
- Where is my Threat Model?
- Why You Should Care About Threat Modelling
- Where is my Threat Model?
- Why You Should Care About Threat Modelling
- Where is my Threat Model?
- Where is my Threat Model?
- Why You Should Care About Threat Modelling
- Where is my Threat Model?
- Why You Should Care About Threat Modelling
- Threat Modelling Toolkit
- Where is my Threat Model?
- Why You Should Care About Threat Modelling
- Where is my Threat Model?
- Where is my Threat Model?
- Why You Should Care About Threat Modelling
- Where is my Threat Model?
- Why You Should Care About Threat Modelling
- Where is my Threat Model?
- Where is my Threat Model?
- What Is Security Threat Modeling?
- Threat-modeling CheatSheet By Owasp
- Threat Modeling in the Enterprise
- Approachable threat modeling
- Threat Modeling for Dummies
- DevSecOps, Threat Modeling and You: Get started using the STRIDE method
- Threat Modeling: The Why, How, When and Which Tools
- Threat-modeling datasheet
- Threat Modeling blog
- Why You Should Care About Threat Modelling
- Benefits of Threat Modeling
- Threat Modelling Toolkit
- How to get started with Threat Modeling, before you get hacked
- Thread Modeling tutorial
- How to analyze the security of your application with threat modeling
- Tactical Threat Modeling
- The Power of a Tailored Threat Model Whitepaper
- Where is my Threat Model?
- Secure Slack bot an exercise in threat modeling
- Where is my Threat Model?
- Why You Should Care About Threat Modelling
- Where is my Threat Model?
- Why You Should Care About Threat Modelling
- Where is my Threat Model?
- Why You Should Care About Threat Modelling
- Where is my Threat Model?
- Where is my Threat Model?
- Why You Should Care About Threat Modelling
- Where is my Threat Model?
- Why You Should Care About Threat Modelling
- Where is my Threat Model?
- Why You Should Care About Threat Modelling
- Where is my Threat Model?
- Why You Should Care About Threat Modelling
- Where is my Threat Model?
- Why You Should Care About Threat Modelling
- Where is my Threat Model?
- Where is my Threat Model?
- Where is my Threat Model?
- Why You Should Care About Threat Modelling
- Where is my Threat Model?
- Where is my Threat Model?
- Why You Should Care About Threat Modelling
- Why You Should Care About Threat Modelling
- Where is my Threat Model?
- Where is my Threat Model?
- Why You Should Care About Threat Modelling
- Where is my Threat Model?
- Why You Should Care About Threat Modelling
- Where is my Threat Model?
- Why You Should Care About Threat Modelling
- Where is my Threat Model?
- Where is my Threat Model?
- Why You Should Care About Threat Modelling
- Where is my Threat Model?
- Why You Should Care About Threat Modelling
- Where is my Threat Model?
- Why You Should Care About Threat Modelling
- Where is my Threat Model?
- Why You Should Care About Threat Modelling
- Where is my Threat Model?
- Where is my Threat Model?
- Where is my Threat Model?
- Where is my Threat Model?
- Threat Modeling: What, Why, and How?
- Why You Should Care About Threat Modelling
- Where is my Threat Model?
- Why You Should Care About Threat Modelling
- Why You Should Care About Threat Modelling
- Where is my Threat Model?
- Where is my Threat Model?
- Why You Should Care About Threat Modelling
- Where is my Threat Model?
- Why You Should Care About Threat Modelling
- Threat Modeling: a Summary of Available Methods Whitepaper
- Where is my Threat Model?
- Why You Should Care About Threat Modelling
- Where is my Threat Model?
- Why You Should Care About Threat Modelling
- Why You Should Care About Threat Modelling
- Where is my Threat Model?
- Why You Should Care About Threat Modelling
-
-
Books
-
Courses
-
Free
- Threat Modeling, or Architectural Risk Analysis by Coursera
- Threat Modeling Workshop by Robert Hurlbut
- Rapid Threat Model Prototyping (RTMP) - Methodology to create quick threat models (1) add threat metadata describing the threats and mitigations directly to software diagrams using 11 simple and repeatable steps (2) integrate these steps into Agile workstreams (3) how to best use the outputs of a threat model (Threats & Mitigations)
-
Paid
-
-
Threat Model examples
-
Tools
-
Free tools
- Owasp-threat-dragon-gitlab - This project is a fork of the original OWASP Threat Dragon web application by Mike Goodwin with Gitlab integration instead of GitHub. You can use it with the Gitlab.com or your own instance of Gitlab.
- Raindance - Project intended to make Attack Maps part of software development by reducing the time it takes to complete them.
- Threagile - Threagile is an open-source toolkit for agile threat modeling
- OWASP Threat Dragon - An online threat modelling web application including system diagramming and a rule engine to auto-generate threats/mitigations.
- Threatspec - Threatspec is an open source project that aims to close the gap between development and security by bringing the threat modelling process further into the development process.
-
Paid tools
- SD elements - Automate Threat Modeling with SD Elements.
- Foreseeti - SecuriCAD Vanguard is an attack simulation and automated threat modeling SaaS service that enables you to automatically simulate attacks on a virtual model of your AWS environment.
-
-
Videos
-
Paid
- Introduction, Threat Models
- Creating a Threat Model using TMT 2016
- Using Threat Modeling
- Threat Modeling in 2019
- Threat Modeling Toolkit
- Adaptive Threat Modelling
- Threat modeling
- Threat Model Every Story: Practical Continuous Threat Modeling Work for Your Team
- Threat Modeling for Secure Software Design
- Fixing Threat Models with OWASP Efforts
- Designing for Security through Threat Modelling
- Unlocking Threat Modeling
- An Agile Approach to Threat Modeling for Securing Open Source Project EdgeX Foundry
- Threat Modeling 101 (SAFECode On Demand Training Course)
- ISO/SAE 21434 by Example
- Introduction to Threat Modeling by Avi Douglen
- Look, there's a threat model in my DevOps
- ISO/SAE 21434 by Example
- ISO/SAE 21434 by Example
- Introduction to Threat Modeling by Avi Douglen
- Look, there's a threat model in my DevOps
-
Programming Languages
Sub Categories