mirror of
https://github.com/hysnsec/awesome-threat-modelling.git
synced 2024-10-01 08:25:38 -04:00
Merge branch 'master' into master
This commit is contained in:
commit
68f590cc03
@ -65,6 +65,7 @@ Contributions welcome. Add links through pull requests or create an issue to sta
|
||||
|
||||
- [Threat Modeling or Whiteboard Hacking training](https://www.toreon.com/threatmodeling/)
|
||||
|
||||
- [Kubernetes Threat Modeling](https://learning.oreilly.com/live-events/kubernetes-threat-modeling/0636920055610/0636920059945/)
|
||||
|
||||
## Videos
|
||||
|
||||
@ -173,7 +174,7 @@ Contributions welcome. Add links through pull requests or create an issue to sta
|
||||
|
||||
- [OWASP Threat Model Cookbook](https://github.com/OWASP/threat-model-cookbook)
|
||||
|
||||
- [Kubernetes Threat Model](https://github.com/kubernetes/community/tree/master/sig-security/security-audit-2019/findings)
|
||||
- [Kubernetes Threat Model](https://github.com/kubernetes/sig-security/tree/main/sig-security-external-audit/security-audit-2019/findings)
|
||||
|
||||
- [ISO/SAE 21434 Annex G Example](https://github.com/Yakindu/YSA-examples)
|
||||
|
||||
@ -203,6 +204,11 @@ Contributions welcome. Add links through pull requests or create an issue to sta
|
||||
|
||||
- [TicTaaC](https://github.com/rusakovichma/TicTaaC) - Threat modeling-as-a-Code in a Tick (TicTaaC). Lightweight and easy-to-use Threat modeling solution following DevSecOps principles
|
||||
|
||||
- [Threat Modeling Online Game](https://github.com/dehydr8/elevation-of-privilege) - Online version of the Elevation of Privilege and Cornucopia card games. The easy way to get started with threat modeling.
|
||||
|
||||
- [Deciduous](https://github.com/rpetrich/deciduous) - A web app that simplifies building attack decision trees. Hosted at https://www.deciduous.app/
|
||||
|
||||
|
||||
### Paid tools
|
||||
|
||||
- [Irius risk](https://iriusrisk.com/threat-modeling-tool/) - Iriusrisk is a threat modeling tool with an adaptive questionnaire driven by an expert system which guides the user through straight forward questions about the technical architecture, the planned features and security context of the application.
|
||||
|
Loading…
Reference in New Issue
Block a user