The source files and tools needed to build the OWASP Cornucopia decks in various languages
☆119Mar 21, 2026Updated this week
Alternatives and similar repositories for cornucopia
Users that are interested in cornucopia are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- OWASP Foundation Web Respository☆22Feb 27, 2026Updated 3 weeks ago
- OWASP Foundation web repository☆35Mar 16, 2026Updated last week
- ☆35Mar 8, 2022Updated 4 years ago
- Measure release insights and recommendations for open-source dependencies. Note: this project is archived.☆10Jan 3, 2023Updated 3 years ago
- GitHub Action to generate GitHub Advanced Security (GHAS) metrics report☆18Feb 1, 2025Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- InfoSec OpenAI Examples☆19Nov 26, 2023Updated 2 years ago
- OWASP Project Developer Guide - Document and Project Web pages☆116Mar 15, 2026Updated last week
- ☆17Feb 3, 2026Updated last month
- OWASP Foundation Web Respository☆28Dec 22, 2025Updated 3 months ago
- InSpec profile to validate the secure configuration of Red Hat Enterprise Linux 7, against DISA's Red Hat Enterprise Linux 7 Security Tec…☆15Dec 15, 2025Updated 3 months ago
- ☆147Mar 16, 2026Updated last week
- OWASP Threat Dragon core files☆11Jan 26, 2026Updated 2 months ago
- An Action to wrap creating an SBOM via REST API☆20Updated this week
- ☆35Mar 19, 2022Updated 4 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- NIVA is a simple web application which is intentionally vulnerable to NoSQL injection. The purpose of this project is to facilitate a bet…☆19Nov 21, 2022Updated 3 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆11Oct 29, 2018Updated 7 years ago
- Practical Library Of Threats 4 Artificial Intelligence☆36Jun 19, 2025Updated 9 months ago
- An auto-scoring capture-the-flag game focusing on TOCTOU vulnerabilities☆21Oct 28, 2020Updated 5 years ago
- A threat modeling tool that implements the Trike v2 methodology in Smalltalk☆16Nov 18, 2019Updated 6 years ago
- A malicious KeePass plugin to exfiltrate the master key.☆15Oct 25, 2021Updated 4 years ago
- The AI Security Verification Standard (AISVS) focuses on providing developers, architects, and security professionals with a structured c…☆92Updated this week
- The source of ZAP website☆78Updated this week
- A terraform module to deploy Minecraft Java edition on Azure☆10Jan 7, 2025Updated last year
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- THOR APT Scanner User Manual☆20Mar 9, 2026Updated 2 weeks ago
- threatspec - continuous threat modeling, through code☆383Dec 30, 2020Updated 5 years ago
- Small tool to decode ASP.NET __VIEWSTATE variable when doing webpentests☆15Feb 27, 2021Updated 5 years ago
- Jenkins Security Research or Hacking Jenkins ;)☆12Dec 10, 2024Updated last year
- OWASP Ontology-driven Threat Modelling framework☆40Jul 11, 2023Updated 2 years ago
- A flexible, easy to use, automation framework allowing users to integrate their capabilities and devices to cut through the repetitive, t…☆12Nov 23, 2022Updated 3 years ago
- Presentations, training modules, and other education materials from Duo Security's Application Security team.☆76Jul 15, 2021Updated 4 years ago
- OWASP Foundation Web Respository☆28Dec 5, 2025Updated 3 months ago
- This repo contains the infomations and drivers for FYSETC CTP40 display☆12Apr 24, 2023Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Public repository for Red Canary Research☆38Oct 29, 2020Updated 5 years ago
- A simple web app to get the latest EPSS data for a CVE ID☆12Dec 14, 2025Updated 3 months ago
- DefectDojo Community Content☆19Nov 9, 2025Updated 4 months ago
- OWASP Threat Dragon with Gitlab Integration☆27Nov 6, 2017Updated 8 years ago
- ☆11May 30, 2021Updated 4 years ago
- ☆13Dec 29, 2020Updated 5 years ago
- ☆10Jan 30, 2023Updated 3 years ago