Loading...
Threat modeling tools for identifying security risks, attack vectors, and potential threats in system architectures.
Browse 18 threat modeling tools
Automates security tool stack optimization based on threat profiles
Automates security tool stack optimization based on threat profiles
Custom threat profiling services for industry-specific cyber threats
Custom threat profiling services for industry-specific cyber threats
Visual attack surface mapping and threat modeling for security teams
Visual attack surface mapping and threat modeling for security teams
AI-driven threat modeling for identifying security risks in design phase
AI-driven threat modeling for identifying security risks in design phase
Professional certification course covering threat modeling frameworks and methods
Professional certification course covering threat modeling frameworks and methods
eBook on PASTA risk-based threat modeling methodology
eBook on PASTA risk-based threat modeling methodology
Professional threat modeling service for identifying app security flaws
Professional threat modeling service for identifying app security flaws
Framework for modeling access control and attack graphs in networked systems
Framework for modeling access control and attack graphs in networked systems
AI-powered continuous threat modeling for cloud applications in runtime
AI-powered continuous threat modeling for cloud applications in runtime
A mapping tool that correlates MITRE ATT&CK techniques with atomic tests and detection rules to analyze security detection coverage.
A mapping tool that correlates MITRE ATT&CK techniques with atomic tests and detection rules to analyze security detection coverage.
A Pythonic framework for automated threat modeling shifting left.
SeaSponge is an accessible web-based threat modeling tool with a focus on accessibility, aesthetics, and intuitive user experience.
SeaSponge is an accessible web-based threat modeling tool with a focus on accessibility, aesthetics, and intuitive user experience.
A summary of the threat modeling posts and final thoughts on the process
A summary of the threat modeling posts and final thoughts on the process
A comprehensive library documenting Amazon S3 attack scenarios and risk-based mitigation strategies for cloud storage security.
A comprehensive library documenting Amazon S3 attack scenarios and risk-based mitigation strategies for cloud storage security.
CAPEC™ is a comprehensive dictionary of known attack patterns used by adversaries to exploit weaknesses in cyber-enabled capabilities.
CAPEC™ is a comprehensive dictionary of known attack patterns used by adversaries to exploit weaknesses in cyber-enabled capabilities.
Globally-accessible knowledge base of adversary tactics and techniques for cybersecurity.
Globally-accessible knowledge base of adversary tactics and techniques for cybersecurity.
A minimalistic Java library for representing threat model data in a normalized way and automating threat intelligence extraction.
A minimalistic Java library for representing threat model data in a normalized way and automating threat intelligence extraction.
Common questions about Threat Modeling tools including selection guides, pricing, and comparisons.
Threat modeling tools for identifying security risks, attack vectors, and potential threats in system architectures.
Fix-first AppSec powered by agentic remediation, covering SCA, SAST & secrets.
Cybercrime intelligence tools for searching compromised credentials from infostealers
Password manager with end-to-end encryption and identity protection features
Fractional CISO services for B2B companies to build security programs
Real-time OSINT monitoring for leaked credentials, data, and infrastructure
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance
Get strategic cybersecurity insights in your inbox