Threat-Models-as Code, An Action-Oriented Threat Modeling and Automation Framework
Project description
ThreatPlaybook
A (relatively) Unopinionated framework that faciliates Threat Modeling as Code married with Application Security Automation on a single Fabric
Catch up with us at BlackHat USA 2018 at Arsenal between 4pm and 5:20pm on 8th Aug 2018
Brought to you proudly by
Documentation and Installation Instructions
We highly encourage you to go over the documentation for better understanding how you can leverage/contribute to ThreatPlaybook
ThreatPlaybook Documentation - Gitbook
Keyword Documentation for this library is here
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
ThreatPlaybook-1.2a5.tar.gz
(88.2 kB
view details)
File details
Details for the file ThreatPlaybook-1.2a5.tar.gz.
File metadata
- Download URL: ThreatPlaybook-1.2a5.tar.gz
- Upload date:
- Size: 88.2 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/1.12.1 pkginfo/1.4.2 requests/2.19.1 setuptools/40.4.2 requests-toolbelt/0.8.0 tqdm/4.26.0 CPython/2.7.13
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
7c7e09939286523f994aee9ec95788265b150993b6393d7df47fe3ac5d5a8ad8
|
|
| MD5 |
8cd408dc2d0f5e6cb83e10a506ce572e
|
|
| BLAKE2b-256 |
b0fb98da2e3c6f325e6f945c01a1e84c8c9c653169a387f3b94d151b39e71c95
|