dehydr8 / elevation-of-privilegeView external linksLinks
An online multiplayer version of the Elevation of Privilege (EoP) threat modeling card game
☆159Jan 29, 2026Updated 2 weeks ago
Alternatives and similar repositories for elevation-of-privilege
Users that are interested in elevation-of-privilege are comparing it to the libraries listed below
Sorting:
- Privacy Cards for Software Developers☆54May 17, 2019Updated 6 years ago
- StartLeft is an automation tool for generating Threat Models written in the Open Threat Model (OTM) format from a variety of different so…☆52Nov 25, 2025Updated 2 months ago
- An online multiplayer version of the threat modeling card games: Elevation of Privilege (EoP), OWASP Cornucopia, OWASP Cumulus, and Eleva…☆83Feb 9, 2026Updated last week
- The Elevation of Privilege Threat Modeling Game☆340Jun 20, 2024Updated last year
- A curated list of threat modeling resources (Books, courses - free and paid, videos, tools, tutorials and workshops to practice on ) for …☆1,707Aug 2, 2024Updated last year
- Draw.io libraries for threat modeling diagrams☆785Nov 12, 2020Updated 5 years ago
- ☆35Mar 8, 2022Updated 3 years ago
- A Pythonic framework for threat modeling☆1,103Feb 9, 2026Updated last week
- A Continuous Threat Modeling methodology☆324Jun 24, 2022Updated 3 years ago
- a curated list of useful threat modeling resources☆144Jun 28, 2024Updated last year
- This project is about creating and publishing threat model examples.☆427Nov 10, 2021Updated 4 years ago
- Segment's Threat Modeling training for our engineers☆245May 4, 2021Updated 4 years ago
- Gitlab CI/CD Templates for build,test,deploy to your infra☆12Aug 15, 2024Updated last year
- Quantitative analysis of location reports from Apple's offline finding (OF) location tracking system☆10Apr 20, 2021Updated 4 years ago
- Do you want to learn AI Security but don't know where to start ? Take a look at this map.☆29Apr 23, 2024Updated last year
- Agile Threat Modeling Toolkit☆723Nov 20, 2025Updated 2 months ago
- CDS Threat Modeling Tool MVP☆14Updated this week
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆49Nov 11, 2022Updated 3 years ago
- threatspec - continuous threat modeling, through code☆378Dec 30, 2020Updated 5 years ago
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆179Dec 11, 2025Updated 2 months ago
- a programming language☆11Aug 19, 2020Updated 5 years ago
- ☆18Feb 3, 2026Updated 2 weeks ago
- A simple threat modeling tool to help humans to reduce time-to-value when threat modeling☆671Updated this week
- ☆17Apr 9, 2024Updated last year
- The Measure, Maximize, and Mature Threat-Informed Defense (M3TID) project defines what Threat-Informed Defense (TID) is and the key activ…☆16Jun 25, 2025Updated 7 months ago
- Pin designs for security related items☆37May 10, 2024Updated last year
- List Security Guide☆19Feb 24, 2021Updated 4 years ago
- Take this course to learn how to create fine-grained, least-privilege HashiCorp Vault roles for GitHub Action workflows using GitHub OIDC…☆15Updated this week
- An open source threat modeling tool from OWASP☆1,318Updated this week
- Threat Modeling (based on STRIDE approach) for Kubernetes systems.☆25Oct 14, 2024Updated last year
- PowerShell By Example☆20Mar 10, 2025Updated 11 months ago
- Node application to help managing Maturity Models like the ones created by BSIMM and OpenSAMM☆195Aug 27, 2018Updated 7 years ago
- A collection of real-world threat model examples across various technologies, providing practical insights into identifying and mitigatin…☆483Jun 12, 2025Updated 8 months ago
- Process Orchestration Framework: A camunda 7 fork☆20Updated this week
- Threat Modeling Manifesto☆30Jul 18, 2024Updated last year
- A Crowdsourcing Exchange for mapping various sources of security vulnerabilities, exposures, threats, and controls data☆27May 22, 2019Updated 6 years ago
- Nessus Vulnerability visualization for the web☆31Jan 25, 2016Updated 10 years ago
- french traduction of MIT lockpicking☆29Jun 10, 2017Updated 8 years ago
- AT-AT (Attack Tree Analysis Tool) is a application that allows users to develop and analyze attack trees. The overall goal is to automati…☆29Aug 17, 2022Updated 3 years ago