πŸ”
OffSec Wiki
search
⌘Ctrlk
πŸ”
OffSec Wiki
  • Tools
  • Information Gathering
  • Exploitation
  • Cracking
  • Enumeration
  • API Sec
  • Web Pentesting
  • Linux
  • Wordpress
  • Post Exploitation
  • Persistence
  • Powershell
  • RED Teaming
  • Purple Teaming
  • Reverse Engineering
  • Pivoting
  • Metasploit
  • Networking
  • OSINT
  • Active Directory
  • Cloud
  • Containers
  • WIFI
  • Buffer Overflow
  • Code Review
  • Routers
  • Automotive CyberSec
  • Threat Modeling
    • APT3
    • Intro to Threat Modeling
    • HowTo's
    • General Concepts / TM frameworks
    • OWASP Threat Modeling
    • Threat Modeling based on the MITRE Enterprise ATT&CK Matrix
    • STRIDE
    • PASTA
    • NIST 800-53
  • Hardware & Lock Bypassing
  • Scripting
  • General PT Methodology
  • Blockchain
  • Challenges
  • Flipper
  • CERTS
  • Notes
  • Hacking Kubernetes
  • CV
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Threat Modeling

Intro to Threat Modeling

STRIDE explained:

file-download
2MB
Introduction_to_Threat_Modeling.ppsx
arrow-up-right-from-squareOpen
LogoTHREAT MODELING MADE SIMPLEHenrik Parkkinenchevron-right
LogoAn interview on threat modeling with ChatGPTBusiness Driven Cyber Consulting - Toreonchevron-right
LogoMulti Level Threat Modelling using MITRE ATT&CKHuntsmanchevron-right
PreviousAPT3chevron-leftNextHowTo'schevron-right

Last updated 2 years ago