Azure-DevOps-server-supply-chain-attack-tree

Attack model

An attack tree model for identifying potential security vulnerabilities in an Azure DevOps Server supply chain.

Azure DevOps server supply-chain attack tree (map, Attack surface, threat modeling)

GitHub

7 stars
2 watching
3 forks
last commit: almost 2 years ago
attack-treeattack-treesazure-devopsazure-devops-serversupply-chain

Related projects:

Repository Description Stars
sbasu7241/aws-threat-simulation-and-detection This repository documents the simulation and detection of various AWS attack scenarios using Stratus Red Team and SumoLogic for logging and analysis. 282
azure/simuland A collaboration to create realistic test environments for simulating real-world attacks and improving detection strategies. 703
chong-z/tree-ensemble-attack An approach to create adversarial examples for tree-based ensemble models 22
azure/stormspotter A tool for analyzing and visualizing Azure objects to help security teams understand potential attack surfaces. 1,546
stevespringett/threatmodel-sdk A Java library for parsing and using threat model data in a standardized way 79
devsecops/raindance A framework to simplify attack mapping and security modeling in software development 46
jlopp/physical-bitcoin-attacks Compiles known physical attacks on Bitcoin and cryptocurrency owners 577
lightspin-tech/lightspin-2022-top-7-attack-paths Compiles research on cloud security trends and attack paths 39
indeedops/shadowbuster An attack mapping application that visualizes real-time events and pushes them to the front end via websockets. 79
r3dxpl0it/cve-2018-4407 Exploits a heap buffer overflow vulnerability in the XNU operating system kernel to cause a denial-of-service attack on iOS and macOS devices. 35
attackercan/burp-xss-sql-plugin Automated tool for detecting cross-site scripting (XSS) and SQL injection vulnerabilities in web applications. 44
trustoncloud/threatmodel-for-aws-s3 An inventory of common attack scenarios on Amazon S3 storage and recommended countermeasures 151
cloud-architekt/azuread-attack-defense A collection of attack scenarios and mitigation strategies for Microsoft Entra ID 2,149
voulnet/barq An AWS-focused post-exploitation framework that enables attackers to compromise running EC2 instances without needing original credentials. 386
tomac/yersinia A framework for creating Layer 2 attacks to disrupt Spanning Tree protocols. 722