Skip to main content

Threat-Models-as Code, An Action-Oriented Threat Modeling and Automation Framework

Project description

ThreatPlaybook

A (relatively) Unopinionated framework that faciliates Threat Modeling as Code married with Application Security Automation on a single Fabric

Catch up with us at BlackHat USA 2018 at Arsenal between 4pm and 5:20pm on 8th Aug 2018

Black Hat Arsenal USA

Brought to you proudly by

Documentation and Installation Instructions

We highly encourage you to go over the documentation for better understanding how you can leverage/contribute to ThreatPlaybook

ThreatPlaybook Documentation - Gitbook

Keyword Documentation for this library is here

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

ThreatPlaybook-1.2a5.tar.gz (88.2 kB view details)

Uploaded Source

File details

Details for the file ThreatPlaybook-1.2a5.tar.gz.

File metadata

  • Download URL: ThreatPlaybook-1.2a5.tar.gz
  • Upload date:
  • Size: 88.2 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/1.12.1 pkginfo/1.4.2 requests/2.19.1 setuptools/40.4.2 requests-toolbelt/0.8.0 tqdm/4.26.0 CPython/2.7.13

File hashes

Hashes for ThreatPlaybook-1.2a5.tar.gz
Algorithm Hash digest
SHA256 7c7e09939286523f994aee9ec95788265b150993b6393d7df47fe3ac5d5a8ad8
MD5 8cd408dc2d0f5e6cb83e10a506ce572e
BLAKE2b-256 b0fb98da2e3c6f325e6f945c01a1e84c8c9c653169a387f3b94d151b39e71c95

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page