threagile
EDRHunt
threagile | EDRHunt | |
---|---|---|
5 | 2 | |
564 | 544 | |
2.0% | 0.2% | |
9.1 | 3.1 | |
6 days ago | 8 months ago | |
Go | Go | |
MIT License | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
threagile
- Threagile – Agile Threat Modeling Toolkit
- stumbled upon a new threat modeling resource
- Desarrolla de forma segura, aplicando DevSecOps
-
Let's Talk Threat Modeling Tools
Haven't tried it yet but we are going to kick the tires on https://threagile.io/ in the near future
- Threagile: Agile Threat Modeling Toolkit
EDRHunt
What are some alternatives?
terrascan - Detect compliance and security violations across Infrastructure as Code to mitigate risk before provisioning cloud native infrastructure.
go-dork - The fastest dork scanner written in Go.
ChopChop - ChopChop is a CLI to help developers scanning endpoints and identifying exposition of sensitive services/files/folders.
sx - :vulcan_salute: Fast, modern, easy-to-use network scanner
trivy - Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more
awesome-security-GRC - Curated list of resources for security Governance, Risk Management, Compliance and Audit professionals and enthusiasts (if they exist).
lit-bb-hack-tools - Little Bug Bounty & Hacking Tools⚔️
oisru - Repository for the Open Information Security Risk Universe
Cameradar - Cameradar hacks its way into RTSP videosurveillance cameras
JuliaMCRiskModels - Implementation of a few Monte Carlo Simulation models for risk assets. Additional implementation of Quantum Harmonic Oscillator to be used for longer time horizons.
cariddi - Take a list of domains, crawl urls and scan for endpoints, secrets, api keys, file extensions, tokens and more