The source files and tools needed to build the OWASP Cornucopia decks in various languages
☆113Updated this week
Alternatives and similar repositories for cornucopia
Users that are interested in cornucopia are comparing it to the libraries listed below
Sorting:
- A low-cost approach to testing AI chat experiences and security concepts☆40Jul 23, 2025Updated 7 months ago
- OWASP Foundation web repository☆35Updated this week
- Practical Library Of Threats 4 Artificial Intelligence☆35Jun 19, 2025Updated 8 months ago
- ☆56Feb 19, 2026Updated last week
- A skeleton project for quickly getting a new cisagov Docker container started.☆19Updated this week
- Certbot container that stores its configuration in an AWS S3 bucket☆15Feb 18, 2026Updated last week
- PyDV: Python Data Visualizer☆15Feb 17, 2026Updated last week
- ☆35Mar 8, 2022Updated 3 years ago
- DefectDojo Community Content☆18Nov 9, 2025Updated 3 months ago
- THOR APT Scanner User Manual☆20Jan 30, 2026Updated last month
- GitHub Action to generate GitHub Advanced Security (GHAS) metrics report☆18Feb 1, 2025Updated last year
- Vulnerable Task Manager☆22Jan 14, 2025Updated last year
- This projects provides a logger and a connected harlem shake js.☆20May 17, 2024Updated last year
- NIVA is a simple web application which is intentionally vulnerable to NoSQL injection. The purpose of this project is to facilitate a bet…☆19Nov 21, 2022Updated 3 years ago
- Pulled out Linux kernel code to run in userland so they could be targeted by AFL and KLEE☆20Jan 29, 2020Updated 6 years ago
- A CLI project wrapping application security testing (AST) APIs☆59Updated this week
- PowerShell Tools Documentation☆21Aug 5, 2024Updated last year
- redteamrecipe.com☆24Feb 9, 2024Updated 2 years ago
- Heimdall Lite 2.0 is a JavaScript based security results viewer and review tool supporting multiple security results formats, such as: In…☆21Feb 11, 2022Updated 4 years ago
- Welcome to the NCC Group Threat Intelligence Alert repo, here you will find the alerts which we have raised to our customers regarding in…☆25Feb 6, 2023Updated 3 years ago
- Puma Prey contains vulnerable .NET target applications to test the Puma Scan rules against. This project contains Web Forms, MVC5, and Co…☆21Aug 26, 2025Updated 6 months ago
- InfoSec OpenAI Examples☆19Nov 26, 2023Updated 2 years ago
- OWASP Foundation Web Respository☆165Jan 26, 2026Updated last month
- A web front-end providing a REST-ful API to mount and unmount forensic disk images☆22Feb 14, 2026Updated 2 weeks ago
- Go Damn Vulnerable Web App☆24Jul 16, 2024Updated last year
- An Elixir double-entry library inspired by Ruby's DoubleEntry. Brought to you by CoinJar.☆24Mar 5, 2022Updated 3 years ago
- OWASP Foundation Web Respository☆28Dec 22, 2025Updated 2 months ago
- ☆11Feb 10, 2026Updated 2 weeks ago
- Migrate team-managed project issues between two JIRA Cloud accounts☆12Nov 12, 2024Updated last year
- Website, Docs and Examples for the Jido Ecosystem - PR's welcome☆33Updated this week
- ☆24Feb 2, 2026Updated 3 weeks ago
- ☆10Sep 10, 2024Updated last year
- ☆141Updated this week
- Golang installer for DefectDojo☆29Jan 23, 2025Updated last year
- Caldera plugin to deploy "humans" to emulate user behavior on systems☆31Apr 26, 2024Updated last year
- A community collection of security reviews of open source software components.☆97Feb 29, 2024Updated 2 years ago
- threatspec - continuous threat modeling, through code☆379Dec 30, 2020Updated 5 years ago
- Repository with examples of how to solve a tsp with pso, aco, ga and integer programming☆10Oct 9, 2024Updated last year
- ☆10Dec 5, 2025Updated 2 months ago