TNG / elevation-of-privilege
An online multiplayer version of the threat modeling card games: Elevation of Privilege (EoP), OWASP Cornucopia, OWASP Cumulus, and Elevation of MLsec.
☆69Updated this week
Alternatives and similar repositories for elevation-of-privilege:
Users that are interested in elevation-of-privilege are comparing it to the libraries listed below
- Cumulus. Threat modeling the Clouds.☆38Updated 7 months ago
- ☆107Updated 9 months ago
- Cumulus. Threat modeling the Clouds.☆18Updated 7 months ago
- An online multiplayer version of the Elevation of Privilege (EoP) threat modeling card game☆137Updated 2 weeks ago
- Agile Threat Modeling Toolkit☆659Updated 2 weeks ago
- The "TaSK Framework" is a configurable test tool for performing TLS conformity tests based on the Technical Guideline TR-03116-TS.☆136Updated last year
- boostsecurityio/poutine☆266Updated last week
- OWASP CycloneDX is a full-stack Bill of Materials (BOM) standard that provides advanced supply chain capabilities for cyber risk reductio…☆395Updated last week
- SecObserve is an open source vulnerability and license management system for software development teams and cloud environments. It suppor…☆131Updated this week
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆171Updated 5 months ago
- A standard API specification for exchanging supply chain artifacts and intelligence☆78Updated last week
- ☆81Updated this week
- threatspec - continuous threat modeling, through code☆354Updated 4 years ago
- Enrich SBOMs with data from third party services☆168Updated 3 weeks ago
- Incubating project for decoupling responsibilities from Dependency-Track's monolithic API server into separate, scalable services.☆70Updated this week
- CycloneDX CLI tool for SBOM analysis, merging, diffs and format conversions.☆353Updated 5 months ago
- Machine-readable specification for the attestation of security-relevant data.☆59Updated last week
- App that simplifies building decision trees to model adverse scenarios☆207Updated 9 months ago
- SBOM quality score - Quality metrics for your sboms☆206Updated this week
- Vulnerability-Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streaml…☆256Updated last week
- ☆524Updated this week
- Add a layer of active defense to your cloud applications.☆91Updated this week
- OpenVEX Specification☆145Updated 3 weeks ago
- ☆100Updated 3 weeks ago
- Tools to download or provide CSAF (Common Security Advisory Framework) documents.☆43Updated 3 weeks ago
- OASIS CSAF TC: Supporting version control for Work Product artifacts developed by members of TC, including prose specifications and secon…☆170Updated last week
- A repository with examples of CycloneDX BOMs (SBOM, SaaSBOM, OBOM, VEX, etc)☆193Updated last week
- Audit Dependency-Track findings and policy violations via policy as code☆33Updated last week
- ☆63Updated 3 months ago
- The S2C2F Project is a group working within the OpenSSF's Supply Chain Integrity Working Group formed to further develop and continuously…☆208Updated 2 months ago