shellsharks, 5 months ago @simontsui It’s definitely something that could be helpful when performing threat modeling, especially when doing threat generation. I consider it one (of the many) “Attack Libraries” out there (https://shellsharks.com/threat-modeling#attack-libraries)
@simontsui It’s definitely something that could be helpful when performing threat modeling, especially when doing threat generation. I consider it one (of the many) “Attack Libraries” out there (https://shellsharks.com/threat-modeling#attack-libraries)