A Defense Lab created from scratch.
-
Updated
Sep 12, 2024 - Shell
A Defense Lab created from scratch.
I developed a rigorous cybersecurity project portfolio on mock clients covering NIST, audits, Linux, SQL, assets, threats, vulnerabilities, detection, incident response, escalation, Wireshark, tcpdump, IDS (Suricata), SIEM (Splunk, Chronicle), and Python automation.
An open source threat modeling tool from OWASP
Created a Risk Assessment Report, Threat Modeling Report, Network & Data Security Report, Third-Party Risk Report, Incident Response Plan, Business Continuity Plan, and Executive Summary for VISION (All entities and events in this case study are purely hypothetical. Details of the case study are inspired by real-world events.)
Slide Deck for Inclusion 2024 Conference
This repository hosts a persona based privacy threat modeling solution called Models of Applied Privacy or MAP.
The source files and tools needed to build the OWASP Cornucopia decks in various languages
A simple threat modeling tool to help humans to reduce time-to-value when threat modeling
Spyderisk web service and web client
Agile Threat Modeling Toolkit
Gram is Klarna's own threat model diagramming tool
Simple Threat Detection App
This repository contains the Acme Voting System Threat Model, detailing potential threats, vulnerabilities, and mitigations for securing a voting system.
The Open Security Summit is focused on the collaboration between, Developers and Application Security
StartLeft is an automation tool for generating Threat Models written in the Open Threat Model (OTM) format from a variety of different sources such as IaC files, diagrams or projects exported from Threat Modelling tools.
Cumulus. Threat modeling the Clouds.
Cumulus. Threat modeling the Clouds.
This document proposes an overview of Digital Identities on the Web and an analysis through different use cases of the systemic impact on both the market side and the human side, as well as the role that Web standardization may play in managing that impact
I developed a rigorous cybersecurity project portfolio on mock clients covering NIST, audits, Linux, SQL, assets, threats, vulnerabilities, detection, incident response, escalation, Wireshark, tcpdump, IDS (Suricata), SIEM (Splunk, Chronicle), and Python automation.
Simplifies the review and management of threat models in documents
Add a description, image, and links to the threat-modeling topic page so that developers can more easily learn about it.
To associate your repository with the threat-modeling topic, visit your repo's landing page and select "manage topics."