Threat-Models-as Code, An Action-Oriented Threat Modeling and Automation Framework
Project description
ThreatPlaybook
A (relatively) Unopinionated framework that faciliates Threat Modeling as Code married with Application Security Automation on a single Fabric
Catch up with us at BlackHat USA 2018 at Arsenal between 4pm and 5:20pm on 8th Aug 2018
Brought to you proudly by
Documentation and Installation Instructions
We highly encourage you to go over the documentation for better understanding how you can leverage/contribute to ThreatPlaybook
ThreatPlaybook Documentation - Gitbook
Keyword Documentation for this library is here
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
ThreatPlaybook-1.2a10.tar.gz
(88.0 kB
view details)
File details
Details for the file ThreatPlaybook-1.2a10.tar.gz.
File metadata
- Download URL: ThreatPlaybook-1.2a10.tar.gz
- Upload date:
- Size: 88.0 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/1.12.1 pkginfo/1.4.2 requests/2.19.1 setuptools/40.4.2 requests-toolbelt/0.8.0 tqdm/4.26.0 CPython/2.7.13
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
14c4a37dd62b33285ffb7e6cf70147d591d89d742aa29b6255f6919ddd7c8b63
|
|
| MD5 |
42812c49a20eeba371938759d22ec29b
|
|
| BLAKE2b-256 |
285b208847a5659ca1b5ac6829f3766982c8f8fdbdf669eb39ece568f3be7c84
|