A curated list of security card games.
☆163Jun 2, 2025Updated 9 months ago
Alternatives and similar repositories for awesome-security-card-games
Users that are interested in awesome-security-card-games are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Protection of natural persons with regard to the processing of personal data and on the free movement of such data.☆249Dec 29, 2025Updated 3 months ago
- A curated list of awesome tools, research, papers and other projects related to password cracking and password security.☆910Mar 15, 2026Updated 2 weeks ago
- A curated list of awesome Fuzzing(or Fuzz Testing) for software security☆958Nov 20, 2023Updated 2 years ago
- Curating the best DevSecOps resources and tooling.☆1,649Aug 2, 2024Updated last year
- A curated list of awesome things related to Suricata☆221Nov 21, 2025Updated 4 months ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- A curated list of awesome malware persistence tools and resources.☆278Oct 3, 2025Updated 5 months ago
- Proactive, Open source API security → API discovery, API Security Posture, Testing in CI/CD, Test Library with 1000+ Tests, Add custom te…☆1,455Updated this week
- 🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.☆5,214Jul 15, 2024Updated last year
- A curated list of resources for learning about application security☆6,865Feb 22, 2025Updated last year
- 🎓 Because Education should be free. Contributions welcome! 🕵️☆2,827Aug 9, 2025Updated 7 months ago
- 🕶 A high-level overview of the EVM security ecosystem☆194Jun 6, 2022Updated 3 years ago
- Platforms, tools, and guides for critical organizers 🌆☆239Mar 18, 2026Updated last week
- A curated list of CTF frameworks, libraries, resources and softwares☆11,378Jul 22, 2024Updated last year
- An awesome list all about Tor (The Onion Router)☆86May 26, 2025Updated 10 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A curated list of awesome SNMP libraries, tools, and other resources.☆181Feb 13, 2026Updated last month
- Top hashpwn rules☆20Dec 12, 2025Updated 3 months ago
- A curated list of awesome guides, tools, and other resources related to the security and compromise of locks, safes, and keys.☆1,838Jun 28, 2022Updated 3 years ago
- A collection of android security related resources☆9,305Updated this week
- read the docs version of risk management☆27Mar 6, 2023Updated 3 years ago
- Detection Engineering is a tactical function of a cybersecurity defense program that involves the design, implementation, and operation o…☆1,159Dec 19, 2025Updated 3 months ago
- Mitre ATT&CK and Suricata Rules Automation with AI & LLM☆14Sep 28, 2024Updated last year
- A curated list of awesome Real Time Communications resources☆468Feb 28, 2026Updated last month
- OWASP Foundation Web Respository☆32Oct 11, 2025Updated 5 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Code that implements Factor Analysis of Information Risk (FAIR) in combination with MITRE ATT&CK using Markov Chain Monte Carlo (via PyMC…☆44Dec 10, 2025Updated 3 months ago
- List of Awesome Hacking Locations, organised by Country and City, listing if it features power and wifi☆1,112Aug 24, 2025Updated 7 months ago
- ARP Spoofing Defender is a project designed to protect local networks from ARP Spoofing attacks. ARP Spoofing Defender provides mechanism…☆23Nov 24, 2025Updated 4 months ago
- Run individual controls or full compliance benchmarks for NSA CISA Kubernetes Hardening Guidance across all of your Kubernetes clusters u…☆31Updated this week
- Various XSL templates to manipulate data from NMap XML reports☆27Dec 21, 2018Updated 7 years ago
- The ACSC CyberTools Plugins are build upon the functionality of the Constellation data visualisation platform to deliver enrichments suit…☆26Jul 26, 2023Updated 2 years ago
- An awesome list of resources for specific science, technology, engineering, art, and math (STEAM) classes that students and teachers can …☆212Jun 19, 2024Updated last year
- Windows priviledge escalation script☆13Feb 1, 2025Updated last year
- Agile Threat Modeling as Code☆13Jun 30, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A platform to automate and orchestrate security rules for governance, risk and compliance, and continuous assurance.☆40Mar 12, 2026Updated 2 weeks ago
- ☆14Mar 28, 2018Updated 8 years ago
- ☆11Dec 10, 2023Updated 2 years ago
- Awesome Secure Coding☆18Feb 13, 2026Updated last month
- Repository for AsBuiltReport Microsoft Azure module☆28Feb 10, 2026Updated last month
- 👻 A curated list of awesome VLC and LibVLC resources.☆268Mar 18, 2026Updated last week
- Script for automating multiple word files to be used with Hashcat☆11Apr 9, 2024Updated last year