Source code samples for "Defence in Depth" articles and presentations.
☆38Mar 13, 2026Updated last week
Alternatives and similar repositories for defence-in-depth
Users that are interested in defence-in-depth are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A threat modeling tool that implements the Trike v2 methodology in Smalltalk☆16Nov 18, 2019Updated 6 years ago
- Original workshops and staging area for new ones☆16Jul 3, 2025Updated 8 months ago
- ☆10Nov 8, 2021Updated 4 years ago
- CVE-2024-23897 jenkins-cli☆15Jan 27, 2024Updated 2 years ago
- ☆11Feb 24, 2017Updated 9 years ago
- Wicket with Kotlin characteristics☆11Dec 7, 2018Updated 7 years ago
- Java SDK for the Raygun service☆25Feb 7, 2025Updated last year
- ☆22Jun 12, 2022Updated 3 years ago
- A way to create a Hippo integration environment in Docker, useful for CI environments.☆28Aug 30, 2014Updated 11 years ago
- Converting MIDI messages to control voltage☆19Dec 29, 2024Updated last year
- Provides integration between Apache Wicket and Select2☆63Jun 7, 2021Updated 4 years ago
- A Github example repository containing the code for a talk☆17Apr 18, 2024Updated last year
- maven plugin to invoke gradle☆18May 26, 2020Updated 5 years ago
- A very vulnerable implementation of a GraphQL API.☆61Nov 12, 2021Updated 4 years ago
- AT-AT (Attack Tree Analysis Tool) is a application that allows users to develop and analyze attack trees. The overall goal is to automati…☆29Aug 17, 2022Updated 3 years ago
- Pathbyter is a lightning fast proof-of-concept ransomware that uses RSA wrapped AES, multiprocessing, in memory key encryption, appends e…☆26Sep 25, 2023Updated 2 years ago
- Source code and writeups for CSCTF'24!☆19Sep 15, 2024Updated last year
- Jasmin ransomware web panel path traversal PoC☆21Apr 9, 2024Updated last year
- Logstash / Filebeat appender for JBoss Wildfly☆16Nov 22, 2025Updated 4 months ago
- Proposal for a method to create trails using the Web Annotation Data Model☆31Apr 26, 2017Updated 8 years ago
- This is a PHP5 class that creates a secure php user session and also offers vigorous password encryption. It is compatible with both PDO…☆21Jan 19, 2011Updated 15 years ago
- Caterpillar is a security scanning library for AI agent skill files (e.g., Claude Code skills) for dangerous or malicious behavior☆41Feb 16, 2026Updated last month
- OWASP Foundation Web Respository☆22Oct 9, 2025Updated 5 months ago
- Hackeriet Website☆19Dec 28, 2025Updated 2 months ago
- Parse a RFC 3339 duration string into time.Duration☆32Nov 29, 2022Updated 3 years ago
- Example code on how Spring's JdbcTemplate query API can be used with Java 8 Streams☆26Jan 15, 2016Updated 10 years ago
- Elevation of MLsec: a threat-modeling card game for machine learning systems☆33Nov 24, 2025Updated 4 months ago
- An open source multi-modal trip planner☆25Feb 13, 2025Updated last year
- We all have a BOATLOAD of data strewn across different apps. This is my attempt to unify my data into a common warehouse and do cool stuf…☆46Mar 23, 2023Updated 3 years ago
- Exercise files for my course Hashicorp Certified Vault Associate: Getting Started☆44Aug 14, 2021Updated 4 years ago
- Assess certain AWS network configurations☆12Aug 22, 2018Updated 7 years ago
- Official code for the paper entitled "Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense"☆16Apr 10, 2025Updated 11 months ago
- A tool to discover bygonessl vulnerabilities using the facebook API☆20Oct 2, 2019Updated 6 years ago
- ☆10Jan 14, 2015Updated 11 years ago
- token exchange as a service☆11Updated this week
- Small Node CLI tool to extract active contributors on repos and orgs☆10Dec 6, 2022Updated 3 years ago
- A Norwegian wordlist☆24Aug 3, 2022Updated 3 years ago
- ☆14Jan 8, 2026Updated 2 months ago
- Pipe stuff to Neo4j☆10Jun 4, 2020Updated 5 years ago