Skip to main content

Threat-Models-as Code, An Action-Oriented Threat Modeling and Automation Framework

Project description

ThreatPlaybook

A (relatively) Unopinionated framework that faciliates Threat Modeling as Code married with Application Security Automation on a single Fabric

Brought to you proudly by

Documentation and Installation Instructions

We highly encourage you to go over the documentation for better understanding how you can leverage/contribute to ThreatPlaybook

ThreatPlaybook Documentation - Gitbook

Keyword Documentation for this library is here

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

ThreatPlaybook-0.94.tar.gz (9.3 kB view details)

Uploaded Source

File details

Details for the file ThreatPlaybook-0.94.tar.gz.

File metadata

  • Download URL: ThreatPlaybook-0.94.tar.gz
  • Upload date:
  • Size: 9.3 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No

File hashes

Hashes for ThreatPlaybook-0.94.tar.gz
Algorithm Hash digest
SHA256 4fb8ab2d3b4768f131fc413dcfffc57b5c1a5bfbeff4dcbafd4bf093804f48ab
MD5 eddcb65f86b4947a0a5338e841b7bd8c
BLAKE2b-256 bde47bae34ca37bff7579cbf50322b7e31eff58b59d4dd1b9e18468cbc5df681

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page