Skip to main content

Threat-Models-as Code, An Action-Oriented Threat Modeling and Automation Framework

Project description

ThreatPlaybook

A (relatively) Unopinionated framework that faciliates Threat Modeling as Code married with Application Security Automation on a single Fabric

Catch up with us at BlackHat USA 2018 at Arsenal between 4pm and 5:20pm on 8th Aug 2018

Black Hat Arsenal USA

Brought to you proudly by

Documentation and Installation Instructions

We highly encourage you to go over the documentation for better understanding how you can leverage/contribute to ThreatPlaybook

ThreatPlaybook Documentation - Gitbook

Keyword Documentation for this library is here

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

ThreatPlaybook-1.2a10.tar.gz (88.0 kB view details)

Uploaded Source

File details

Details for the file ThreatPlaybook-1.2a10.tar.gz.

File metadata

  • Download URL: ThreatPlaybook-1.2a10.tar.gz
  • Upload date:
  • Size: 88.0 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/1.12.1 pkginfo/1.4.2 requests/2.19.1 setuptools/40.4.2 requests-toolbelt/0.8.0 tqdm/4.26.0 CPython/2.7.13

File hashes

Hashes for ThreatPlaybook-1.2a10.tar.gz
Algorithm Hash digest
SHA256 14c4a37dd62b33285ffb7e6cf70147d591d89d742aa29b6255f6919ddd7c8b63
MD5 42812c49a20eeba371938759d22ec29b
BLAKE2b-256 285b208847a5659ca1b5ac6829f3766982c8f8fdbdf669eb39ece568f3be7c84

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page