The ThreatModel SDK is a minimalistic Java library that provides a basic vendor-neutral object model along with the ability to parse reports generated from common threat modeling tools. The intent of the ThreatModel SDK is to represent threat model data in a normalized way, regardless of approach, tool, or vendor. The primary purpose of the SDK is to facilitate the automation of threat model data by exfiltrating threat intelligence from the model so that identified threats can be automatically added to a team's backlog or defect tracking system. The goal of this project is NOT to graphically represent threat model data through user interfaces. Supported Threat Modeling Tools: Microsoft Threat Modeling Tool 2016. Usage Example: // Threat model file to open File file = new File("/path/to/threatmodel.tm7"); // Creates a normalized, vendor-neutral ThreatModel object ThreatModel threatModel = ThreatModelFactory .parse(file, ThreatModelingTool.MICROSOFT_THREAT_MODELING_TOOL_2016); // Java Bean conventions Threat threat = new Threat(); threat.setName("XSS"); threat.setRisk(risk); // Fluent interface Threat threat = new Threat()
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
Repository for detection content with various types of rules and payloads.
An IOC tracker written in Python that queries Google Custom Search Engines for various cybersecurity indicators and monitors domain status using Google Safe Browsing APIs.
Get insights into the latest cybersecurity trends and expert advice on enhancing organizational security.
Yara rule generator using VirusTotal code similarity feature code-similar-to.
A tool designed to extract additional value from enterprise-wide AppCompat / AmCache data
A threat intelligence service providing actionable IoCs and security data feeds to help organizations detect, block, and respond to cyber threats.
RedEye is a visual analytic tool for enhancing Red and Blue Team operations.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.