https://owasp.org/www-community/Application_Threat_Modelingarrow-up-right
https://github.com/hysnsec/awesome-threat-modellingarrow-up-right
https://twitter.com/shehackspurple/status/1281651816237690881arrow-up-right
https://twitter.com/ZephrFish/status/1272634494235926530arrow-up-right
https://martinfowler.com/articles/agile-threat-modelling.html#GrowYourPractisearrow-up-right
https://medium.com/sagefuturemakers/real-world-threat-modelling-fb14ef767c49arrow-up-right
https://dev.to/azure/pushing-left-like-a-boss-part-6-threat-modelling-1j5garrow-up-right
https://www.youtube.com/watch?v=0t0kD68U7rcarrow-up-right
https://twitter.com/sharathkramadas/status/1053069538885922817arrow-up-right
https://twitter.com/orchestronIOarrow-up-right
https://www.youtube.com/c/kpcercarrow-up-right
https://dev.to/shehackspurple/ama-where-can-we-learn-threat-modelling-30cgarrow-up-right
Good Link - https://docs.google.com/document/d/10KxP5yuDmem53KhV7UBBCRXviZfH1iQS7nr3NSL3OFg/edit#arrow-up-right
https://github.com/izar/pytmarrow-up-right
https://github.com/secmerc/materialize-threatsarrow-up-right
https://github.blog/2020-09-02-how-we-threat-model/arrow-up-right
Last updated 1 year ago