An online multiplayer version of the Elevation of Privilege (EoP) threat modeling card game
☆159Feb 27, 2026Updated last week
Alternatives and similar repositories for elevation-of-privilege
Users that are interested in elevation-of-privilege are comparing it to the libraries listed below
Sorting:
- Privacy Cards for Software Developers☆54May 17, 2019Updated 6 years ago
- StartLeft is an automation tool for generating Threat Models written in the Open Threat Model (OTM) format from a variety of different so…☆53Updated this week
- The Elevation of Privilege Threat Modeling Game☆343Jun 20, 2024Updated last year
- OWASP Threat Dragon with Gitlab Integration☆27Nov 6, 2017Updated 8 years ago
- A curated list of threat modeling resources (Books, courses - free and paid, videos, tools, tutorials and workshops to practice on ) for …☆1,719Aug 2, 2024Updated last year
- Draw.io libraries for threat modeling diagrams☆786Nov 12, 2020Updated 5 years ago
- a curated list of useful threat modeling resources☆147Jun 28, 2024Updated last year
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆69Jun 25, 2025Updated 8 months ago
- This project is about creating and publishing threat model examples.☆429Nov 10, 2021Updated 4 years ago
- Segment's Threat Modeling training for our engineers☆245May 4, 2021Updated 4 years ago
- Gitlab CI/CD Templates for build,test,deploy to your infra☆12Aug 15, 2024Updated last year
- Various XSL templates to manipulate data from NMap XML reports☆27Dec 21, 2018Updated 7 years ago
- Agile Threat Modeling Toolkit☆727Nov 20, 2025Updated 3 months ago
- CDS Threat Modeling Tool MVP☆14Updated this week
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆49Nov 11, 2022Updated 3 years ago
- threatspec - continuous threat modeling, through code☆382Dec 30, 2020Updated 5 years ago
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆181Dec 11, 2025Updated 2 months ago
- a programming language☆12Aug 19, 2020Updated 5 years ago
- ☆18Feb 3, 2026Updated last month
- ☆17Apr 9, 2024Updated last year
- ☆13Dec 12, 2021Updated 4 years ago
- Microsoft Threat Modeling Template files☆202Nov 28, 2022Updated 3 years ago
- Pin designs for security related items☆37Feb 16, 2026Updated 3 weeks ago
- Take this course to learn how to create fine-grained, least-privilege HashiCorp Vault roles for GitHub Action workflows using GitHub OIDC…☆15Updated this week
- An open source threat modeling tool from OWASP☆1,337Updated this week
- AI-driven Threat modeling-as-a-Code (TaaC-AI)☆160Jun 29, 2025Updated 8 months ago
- Standalone Go implementation of Metasploit's "db_nmap" and "db_import" commands.☆19Nov 6, 2024Updated last year
- PowerShell By Example☆20Feb 23, 2026Updated 2 weeks ago
- Threat Modeling (based on STRIDE approach) for Kubernetes systems.☆25Oct 14, 2024Updated last year
- Node application to help managing Maturity Models like the ones created by BSIMM and OpenSAMM☆195Aug 27, 2018Updated 7 years ago
- A collection of real-world threat model examples across various technologies, providing practical insights into identifying and mitigatin…☆487Jun 12, 2025Updated 8 months ago
- This project demonstrates the concept of a quantum database using Cirq. The quantum database stores binary data in quantum qubits, and op…☆16Apr 3, 2025Updated 11 months ago
- Process Orchestration Framework: A camunda 7 fork☆21Mar 2, 2026Updated last week
- 📚A curated list of product security resources.☆23Jun 11, 2025Updated 8 months ago
- A Crowdsourcing Exchange for mapping various sources of security vulnerabilities, exposures, threats, and controls data☆27May 22, 2019Updated 6 years ago
- Repo of python/bash scripts for identifying IoC's in threat feed and other online tools☆26Jul 27, 2020Updated 5 years ago
- Nessus Vulnerability visualization for the web☆31Jan 25, 2016Updated 10 years ago
- AT-AT (Attack Tree Analysis Tool) is a application that allows users to develop and analyze attack trees. The overall goal is to automati…☆29Aug 17, 2022Updated 3 years ago
- This repository stores content that can be used to design a Rapid Threat Model Prototyping process for a software development group.☆165Mar 14, 2023Updated 2 years ago