An interactive way to learn threat modeling
☆17Feb 14, 2019Updated 7 years ago
Alternatives and similar repositories for threat-hunters-rpg
Users that are interested in threat-hunters-rpg are comparing it to the libraries listed below
Sorting:
- Kantega Web Application Security Hero Challenge☆19Dec 3, 2020Updated 5 years ago
- A tool for analyzing the attack surface of an application☆19Mar 5, 2025Updated last year
- ☆14Apr 23, 2019Updated 6 years ago
- Ransomware base in Java for all operating systems☆19Jun 13, 2017Updated 8 years ago
- Javascript Code Injection for Debugging☆20Nov 11, 2023Updated 2 years ago
- Caterpillar is a security scanning library for AI agent skill files (e.g., Claude Code skills) for dangerous or malicious behavior☆33Feb 16, 2026Updated 2 weeks ago
- ☆24May 31, 2024Updated last year
- CVE database☆21Sep 2, 2020Updated 5 years ago
- UI für verschiedene Reifegrad-Dimensionen☆32Dec 10, 2022Updated 3 years ago
- ☆24Aug 9, 2022Updated 3 years ago
- A library to assist in security-testing Unicode enabled applications during fuzzing, XSS, SQLi, etc.☆42Jul 1, 2017Updated 8 years ago
- Demonstrates how a malicious dependency could negatively impact the build output.☆25Aug 11, 2023Updated 2 years ago
- Equal Experts Secure Delivery Playbook☆26Feb 21, 2023Updated 3 years ago
- Cloudformation Template and Lambda to detect if Instance Profile credentials are being used outside your AWS Account.☆29Aug 18, 2019Updated 6 years ago
- ☆31Oct 28, 2024Updated last year
- ☆65May 21, 2024Updated last year
- ☆28Aug 6, 2020Updated 5 years ago
- Repository for the wireshark plugin development project of the AMOS 16 course☆10Jan 6, 2017Updated 9 years ago
- Cracker for Apache.lang.commons RandomStringUtils(). Code for "The Java Soothsayer" talk at EkoParty 2017 by Alejo Popovici.☆33Mar 13, 2018Updated 7 years ago
- ☆34Aug 13, 2021Updated 4 years ago
- Kubernetes offensive framework built in eBPF☆39Mar 14, 2023Updated 2 years ago
- Pin designs for security related items☆37Feb 16, 2026Updated 2 weeks ago
- A content-filtering bypass system developed specifically to allow access to trans-related resources on public networks (libraries, school…☆27Nov 15, 2014Updated 11 years ago
- Easily create authenticated data structures☆43Apr 11, 2023Updated 2 years ago
- AppSecPipeline Specification for DevOps automation.☆40Dec 8, 2022Updated 3 years ago
- A wordpress security auditor! Audit your wordpress application for security issues with even 1 request.☆40Jan 13, 2026Updated last month
- This Terraform module consists of the configuration for automating the remediation of AWS EC2 vulnerabilities using AWS Inspector finding…☆50Jul 4, 2025Updated 8 months ago
- Threat Network Detection in Online Social Networks☆10Jan 20, 2017Updated 9 years ago
- Simple implementation of an AppSec Pipeline using the Gasp library☆13Sep 8, 2019Updated 6 years ago
- Fag ol fra mastern☆10Jul 3, 2019Updated 6 years ago
- Small Node CLI tool to extract active contributors on repos and orgs☆10Dec 6, 2022Updated 3 years ago
- CuanticoSecurity☆10Sep 7, 2016Updated 9 years ago
- Curso optativo de Deep Learning para UNICEN☆11Aug 25, 2021Updated 4 years ago
- ☆12Mar 7, 2022Updated 4 years ago
- A microframework based on fasthttp☆12Sep 26, 2023Updated 2 years ago
- The clever vulnerability dependency finder☆96May 10, 2022Updated 3 years ago
- Data about all known supply-chain attacks through history☆63May 28, 2025Updated 9 months ago
- vBrowser is a secure, containerized browser platform designed for covert web investigations. Originally created to support deep and dark …☆20Feb 24, 2026Updated last week
- MultiStep MCP That Returns CVE Information With EPSS Score☆13May 22, 2025Updated 9 months ago