This repository hosts a persona based privacy threat modeling solution called Models of Applied Privacy or MAP.
☆35Jun 27, 2025Updated 10 months ago
Alternatives and similar repositories for xCOMPASS
Users that are interested in xCOMPASS are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The Cloud Property Graph is based on a Code Property Graph and tries to connect static code analysis and Cloud runtime assessment.☆30Jan 22, 2025Updated last year
- Golang SDK for IoTeX bloclchain☆13Feb 24, 2025Updated last year
- Wi-Fi Hacking Workshop☆14Dec 27, 2020Updated 5 years ago
- Spacehuhn Wiki Source☆13Apr 27, 2023Updated 3 years ago
- Mobirise plugin using Google Firebase☆10Oct 6, 2017Updated 8 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Helpers for getting CHN up and running through the Quickstart guide☆12Mar 2, 2021Updated 5 years ago
- Create an Excel Spreadsheet from your firewall rules in Palo Alto Networks Panorama☆13Aug 11, 2016Updated 9 years ago
- Collection of operational focused osquery dashboards.☆10Jan 20, 2021Updated 5 years ago
- Cyberinfrastructure Shell (CIShell) is an open source, community-driven framework/application for the integration and utilization of data…☆31Nov 28, 2018Updated 7 years ago
- Advanced kernel-native security framework to disrupt and prevent DNS-based breaches including C2 channels and tunneling with zero data lo…☆31Aug 30, 2025Updated 8 months ago
- OWASP Learning Gateway Project☆14Apr 18, 2023Updated 3 years ago
- Zscaler Integration MCP Server is a Model Context Protocol (MCP) server designed for managing Several Zscaler Products using Large Langua…☆27Apr 25, 2026Updated last week
- Ultimate software platform for Microchip PIC24/dsPIC33 MCUs☆10Aug 21, 2021Updated 4 years ago
- Threat Hunting is time consuming enough as it is. Coming up with and tracking metrics to justify your hunt team to the Execs often takes…☆13Dec 7, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Outputs vs. outcomes: what's the different and why does it matter?☆16Apr 14, 2025Updated last year
- This is for my crappy (but hopefully useful) MDE and Sentinel KQL queries! #KQLThePlanet☆13Jan 24, 2026Updated 3 months ago
- A reimplementation of the EtherApe style display for OS X. Note that this is not a fork of EtherApe. Written in a kinder, gentler, age …☆21Dec 3, 2018Updated 7 years ago
- ☆15Dec 20, 2022Updated 3 years ago
- Script to mass deauthenticate multiple wireless clients.☆12Jan 1, 2017Updated 9 years ago
- Microsoft Defender for Cloud threat matrix for Kubernetes☆32Feb 7, 2023Updated 3 years ago
- Collection of information and scripts associated with my WWWD DC29 wardriving rig☆14Sep 29, 2021Updated 4 years ago
- ESP32 Camera Hacking Workshop☆14Feb 17, 2020Updated 6 years ago
- Alternative Index Lifecycle Management decoupled from Elastic with more granularity☆13Feb 4, 2026Updated 2 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Linux driver for Semtech SX126x series☆14Jan 6, 2021Updated 5 years ago
- Hardware-backed biometric authentication for Flutter. Create cryptographic signatures using device biometrics with keys stored in Secure …☆16Apr 17, 2026Updated 2 weeks ago
- Migrate to platformio. WiFi Keystroke Injection Tool designed for an Atmega 32u4/ESP8266 Paired via Serial (Cactus WHID Firmware). Also …☆17Jul 26, 2023Updated 2 years ago
- Convert markdown to PDF with embedded mermaid diagram☆14May 29, 2020Updated 5 years ago
- Custom Fortify SCA rules to detect common JSSE certification validation flaws☆11Nov 18, 2015Updated 10 years ago
- Example project showing how to call C# native AOT code libraries from Dart☆13May 28, 2023Updated 2 years ago
- OCaml adapters for crypto providers used in Everest☆10Sep 13, 2018Updated 7 years ago
- A STIX 2.1 Extension Definition for the Course of Action (COA) object type. The nested property extension allows a COA to share machine-r…☆24Dec 11, 2023Updated 2 years ago
- Chrome extension: password generator from master key using PBKDF2 with SHA-256.☆19Sep 14, 2015Updated 10 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- DEPRECATED: Element Hiding Helper extension for Adblock Plus☆11Dec 1, 2017Updated 8 years ago
- PassDock public issue tracker.☆23Nov 11, 2014Updated 11 years ago
- Cross-platform USB device metadata and events.☆16Dec 10, 2016Updated 9 years ago
- Various Raspberry Pi Scripts and programs☆18Mar 6, 2023Updated 3 years ago
- A collection of awesome resources for Splunk Enterprise Security☆22Sep 11, 2020Updated 5 years ago
- ☆17Jul 1, 2022Updated 3 years ago
- RestComm WebRTC Application☆15Nov 1, 2022Updated 3 years ago