Privacy Cards for Software Developers
☆54May 17, 2019Updated 6 years ago
Alternatives and similar repositories for elevation-of-privacy
Users that are interested in elevation-of-privacy are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The Elevation of Privilege Threat Modeling Game☆352Jun 20, 2024Updated last year
- An online multiplayer version of the Elevation of Privilege (EoP) threat modeling card game☆160Apr 22, 2026Updated last week
- A Java library for programmatically calculating OWASP Risk Rating scores☆19Apr 3, 2023Updated 3 years ago
- Open Threat Modeling Template☆52Jul 10, 2024Updated last year
- Elevation of MLsec: a threat-modeling card game for machine learning systems☆33Nov 24, 2025Updated 5 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- We borrow the concept of 'personas' from UX/service design and apply it to threat actors to improve understanding between security, techn…☆11Jun 17, 2020Updated 5 years ago
- This test suite contains over 40 different test cases that have proven to work with different mobile browsers in my research or testing S…☆30Jul 12, 2019Updated 6 years ago
- Wrap radamsa on OSX, add instrumentation / triage.☆15Apr 22, 2016Updated 10 years ago
- Simple mind maps for IoT security attack surfaces and methodologies☆17Aug 12, 2019Updated 6 years ago
- A colour-coded radar chart to keep track of technologies in use, whether they are being evaluated, adopted or phased out.☆14Apr 20, 2026Updated 2 weeks ago
- Finds sensitive stuff in your git repository by specifying terms to look for☆31Feb 16, 2018Updated 8 years ago
- This repository provides examples of Vulnerable and Mitigated code as per CWE Categorization.☆23May 4, 2024Updated 2 years ago
- Notes and reference for ongoing forecasting.☆16Mar 24, 2022Updated 4 years ago
- This repository will teach you have to do my talk "Pushing Left, Like a Boss".☆71Jan 1, 2022Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- An interactive way to learn threat modeling☆17Feb 14, 2019Updated 7 years ago
- An AI-Powered Privacy Threat Modeling tool based on the LINDDUN framework by leveraging Large Language Models.☆27Apr 26, 2026Updated last week
- The Binary Mutation code based on Uroboros☆14Feb 20, 2019Updated 7 years ago
- A script to analyze geographic GSuite Login activity☆10Sep 3, 2017Updated 8 years ago
- Monitors Twitter for new tweets with filter capabilities, lightning-fast using Tweepy's Stream API☆11Jul 27, 2019Updated 6 years ago
- A Continuous Threat Modeling methodology☆327Jun 24, 2022Updated 3 years ago
- Steezy - Ghetto Yara Generation☆15Mar 27, 2023Updated 3 years ago
- The command-line client for Journal☆12Oct 26, 2024Updated last year
- A web security research tool for DOM testing☆27Feb 7, 2026Updated 2 months ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Repository for the wireshark plugin development project of the AMOS 16 course☆10Jan 6, 2017Updated 9 years ago
- ☆94Sep 11, 2025Updated 7 months ago
- Defensomania is a security monitoring and incident response card game.☆64May 24, 2023Updated 2 years ago
- An python script that use apkleaks to scan the android application over web☆11Jun 2, 2022Updated 3 years ago
- covFuzz☆34Jun 8, 2017Updated 8 years ago
- OWASP Foundation web repository☆18Oct 11, 2025Updated 6 months ago
- A proxy for encrypting TCP connections.☆11Mar 15, 2017Updated 9 years ago
- ☆125Nov 8, 2023Updated 2 years ago
- ☆34Aug 13, 2021Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆14Dec 3, 2022Updated 3 years ago
- Top 2025 Vulnerabilities You Shouldn’t Accept in a Pentest Report☆14Feb 6, 2025Updated last year
- Defensive S3 Bucket Squating☆31Jan 18, 2018Updated 8 years ago
- Burp Suite Pro extension☆11May 26, 2017Updated 8 years ago
- pysap SAPMS+SAPRFC patches for Gateway / MS research☆11Apr 30, 2019Updated 7 years ago
- toolings for pentester to makes their life easier☆11Feb 25, 2023Updated 3 years ago
- Tweettioc Splunk App☆20Aug 25, 2020Updated 5 years ago