ASOS / threat-hunters-rpgView external linksLinks
An interactive way to learn threat modeling
☆17Feb 14, 2019Updated 7 years ago
Alternatives and similar repositories for threat-hunters-rpg
Users that are interested in threat-hunters-rpg are comparing it to the libraries listed below
Sorting:
- Kantega Web Application Security Hero Challenge☆19Dec 3, 2020Updated 5 years ago
- ☆14Apr 23, 2019Updated 6 years ago
- A tool for analyzing the attack surface of an application☆19Mar 5, 2025Updated 11 months ago
- Ransomware base in Java for all operating systems☆19Jun 13, 2017Updated 8 years ago
- ☆21Sep 25, 2018Updated 7 years ago
- CVE database☆21Sep 2, 2020Updated 5 years ago
- UI für verschiedene Reifegrad-Dimensionen☆32Dec 10, 2022Updated 3 years ago
- Equal Experts Secure Delivery Playbook☆26Feb 21, 2023Updated 2 years ago
- A library to assist in security-testing Unicode enabled applications during fuzzing, XSS, SQLi, etc.☆42Jul 1, 2017Updated 8 years ago
- Demonstrates how a malicious dependency could negatively impact the build output.☆25Aug 11, 2023Updated 2 years ago
- Cloudformation Template and Lambda to detect if Instance Profile credentials are being used outside your AWS Account.☆29Aug 18, 2019Updated 6 years ago
- ☆31Oct 28, 2024Updated last year
- ☆65May 21, 2024Updated last year
- MCP Snitch is a macOS application that intercepts and monitors MCP server communications, providing security analysis, access control, an…☆93Oct 14, 2025Updated 4 months ago
- ☆28Aug 6, 2020Updated 5 years ago
- ☆34Aug 13, 2021Updated 4 years ago
- Repository for the wireshark plugin development project of the AMOS 16 course☆10Jan 6, 2017Updated 9 years ago
- Cracker for Apache.lang.commons RandomStringUtils(). Code for "The Java Soothsayer" talk at EkoParty 2017 by Alejo Popovici.☆33Mar 13, 2018Updated 7 years ago
- Spotter is a comprehensive Kubernetes security scanner that uses CEL-based rules to identify security vulnerabilities, misconfigurations,…☆70Sep 13, 2025Updated 5 months ago
- ☆36Apr 29, 2025Updated 9 months ago
- Scan your account for the use of untrusted AMIs☆31Updated this week
- Kubernetes offensive framework built in eBPF☆39Mar 14, 2023Updated 2 years ago
- Pin designs for security related items☆37May 10, 2024Updated last year
- A content-filtering bypass system developed specifically to allow access to trans-related resources on public networks (libraries, school…☆27Nov 15, 2014Updated 11 years ago
- Easily create authenticated data structures☆43Apr 11, 2023Updated 2 years ago
- AppSecPipeline Specification for DevOps automation.☆40Dec 8, 2022Updated 3 years ago
- A comprehensive checklist and guide for organizations looking to implement a robust cybersecurity program☆46Feb 2, 2026Updated last week
- A wordpress security auditor! Audit your wordpress application for security issues with even 1 request.☆40Jan 13, 2026Updated last month
- This Terraform module consists of the configuration for automating the remediation of AWS EC2 vulnerabilities using AWS Inspector finding…☆50Jul 4, 2025Updated 7 months ago
- ☆12Jun 10, 2023Updated 2 years ago
- CuanticoSecurity☆10Sep 7, 2016Updated 9 years ago
- A microframework based on fasthttp☆12Sep 26, 2023Updated 2 years ago
- Curso optativo de Deep Learning para UNICEN☆11Aug 25, 2021Updated 4 years ago
- Fag ol fra mastern☆10Jul 3, 2019Updated 6 years ago
- Simple implementation of an AppSec Pipeline using the Gasp library☆13Sep 8, 2019Updated 6 years ago
- Small Node CLI tool to extract active contributors on repos and orgs☆10Dec 6, 2022Updated 3 years ago
- Unicode Security Guide☆120Oct 16, 2017Updated 8 years ago
- The clever vulnerability dependency finder☆96May 10, 2022Updated 3 years ago
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Sep 20, 2024Updated last year