Skip to content

mosabrii/Applied-Threat-Analysis

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

18 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Applied Threat Analysis

This repository contains applied cybersecurity projects focused on proactive (pre-incident) threat analysis and defensive security practices.
The work demonstrates how security professionals analyze risks, model threats, and apply technical controls before an incident occurs.


Repository Focus

The projects in this repository emphasize:

  • Threat analysis and risk identification
  • Threat modeling using structured frameworks
  • Defensive security decision-making
  • Practical application of security concepts using real-world scenarios
  • Scripting and automation to support security operations

This repository represents pre-incident security analysis, where the goal is to identify and reduce risk before exploitation.


Included Projects

1. Threat Modeling using the PASTA Framework

(Process for Attack Simulation and Threat Analysis)

This project applies the PASTA threat modeling framework to evaluate the security posture of a mobile application before launch.

Key activities include:

  • Identifying business objectives and security requirements
  • Evaluating application components and technologies
  • Analyzing data flows and potential attack vectors
  • Identifying threats and exploitable vulnerabilities
  • Mapping threats to attack trees
  • Proposing defensive controls to reduce risk

Skills demonstrated:

  • Threat modeling
  • Risk assessment
  • Security architecture analysis
  • Defensive security planning
  • Proactive security mindset

2. File Integrity and Access Control Automation using Python

This project demonstrates the use of Python scripting to support defensive security operations by managing access control lists.

Scenario overview: A security professional maintains an allow-list of IP addresses permitted to access restricted systems.
The script automatically removes unauthorized IP addresses based on a predefined removal list.

Key technical concepts:

  • Secure file handling using Python
  • Reading and writing files safely
  • Data validation and list manipulation
  • Automation of repetitive security tasks
  • Supporting access control enforcement

Skills demonstrated:

  • Python for security operations
  • Defensive scripting
  • Access control logic
  • Secure automation practices

Tools & Technologies

  • Threat Modeling Frameworks (PASTA)
  • Python (file handling, logic, automation)
  • Security analysis methodologies
  • Risk-based defensive decision-making

Security Perspective

All projects in this repository focus on defensive security and pre-incident analysis.
The goal is not exploitation, but understanding how attacks occur in order to prevent, detect, and mitigate them effectively.


Disclaimer

  • All scenarios are fictional and created for educational and professional demonstration purposes only
  • No real systems, organizations, or individuals are involved
  • Any resemblance to real incidents is purely coincidental.

About

Applied threat analysis and security automation projects focused on proactive risk identification, threat modeling, and adversary-driven analysis using structured frameworks and scripting.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages