Privacy Cards for Software Developers
☆54May 17, 2019Updated 6 years ago
Alternatives and similar repositories for elevation-of-privacy
Users that are interested in elevation-of-privacy are comparing it to the libraries listed below
Sorting:
- The Elevation of Privilege Threat Modeling Game☆343Jun 20, 2024Updated last year
- A Java library for programmatically calculating OWASP Risk Rating scores☆19Apr 3, 2023Updated 2 years ago
- An online multiplayer version of the Elevation of Privilege (EoP) threat modeling card game☆159Updated this week
- We borrow the concept of 'personas' from UX/service design and apply it to threat actors to improve understanding between security, techn…☆11Jun 17, 2020Updated 5 years ago
- ☆14Jan 8, 2026Updated last month
- Open Threat Modeling Template☆52Jul 10, 2024Updated last year
- Steezy - Ghetto Yara Generation☆15Mar 27, 2023Updated 2 years ago
- This test suite contains over 40 different test cases that have proven to work with different mobile browsers in my research or testing S…☆30Jul 12, 2019Updated 6 years ago
- This repository provides examples of Vulnerable and Mitigated code as per CWE Categorization.☆23May 4, 2024Updated last year
- The Binary Mutation code based on Uroboros☆14Feb 20, 2019Updated 7 years ago
- RAWRR is a multiplatform app that assists with note taking and report generation for security evaluations.☆18Feb 8, 2023Updated 3 years ago
- Finds sensitive stuff in your git repository by specifying terms to look for☆31Feb 16, 2018Updated 8 years ago
- Defensive S3 Bucket Squating☆31Jan 18, 2018Updated 8 years ago
- Simple mind maps for IoT security attack surfaces and methodologies☆17Aug 12, 2019Updated 6 years ago
- This repository contains various threat hunting tools written in Python and is documented in the series Python Threat Hunting Tools which…☆18Nov 16, 2023Updated 2 years ago
- Poor mans Splunk. Command line real time statistics while tailing logs☆32Dec 29, 2025Updated 2 months ago
- An interactive way to learn threat modeling☆17Feb 14, 2019Updated 7 years ago
- Tweettioc Splunk App☆20Aug 25, 2020Updated 5 years ago
- A Continuous Threat Modeling methodology☆324Jun 24, 2022Updated 3 years ago
- This repository will teach you have to do my talk "Pushing Left, Like a Boss".☆71Jan 1, 2022Updated 4 years ago
- ☆18Apr 21, 2020Updated 5 years ago
- ☆22Jan 6, 2022Updated 4 years ago
- ☆91Sep 11, 2025Updated 5 months ago
- Python tool for bulk PDF feature extraction. This tool is a prototype.☆25Jan 9, 2017Updated 9 years ago
- Caterpillar is a security scanning library for AI agent skill files (e.g., Claude Code skills) for dangerous or malicious behavior☆33Feb 16, 2026Updated 2 weeks ago
- Elevation of MLsec: a threat-modeling card game for machine learning systems☆31Nov 24, 2025Updated 3 months ago
- All Day DevOps - Automated Infrastructure Security Monitoring and Defence (ELK + AWS Lambda)☆25Dec 7, 2016Updated 9 years ago
- Collection of my slide decks, conference videos and research white papers☆27Sep 23, 2025Updated 5 months ago
- read the docs version of risk management☆27Mar 6, 2023Updated 2 years ago
- ☆43Aug 27, 2025Updated 6 months ago
- OWASP Foundation Web Respository☆28Dec 5, 2025Updated 3 months ago
- ☆24Aug 8, 2025Updated 6 months ago
- Planning for next generation secure chat.☆37Mar 12, 2015Updated 10 years ago
- OWASP Cloud Security - Enabling conversations through threat and control stories☆182Dec 7, 2018Updated 7 years ago
- ☆124Nov 8, 2023Updated 2 years ago
- InvestigationPlaybookSpec☆71Sep 26, 2017Updated 8 years ago
- ☆34Aug 13, 2021Updated 4 years ago
- 🤖 A GitHub action that leverages fabric patterns through an agent-based approach☆34Jan 4, 2025Updated last year
- One Day of Python for SaintCon 2022☆11Jan 3, 2023Updated 3 years ago