IriusRisk Community
☆71Sep 5, 2023Updated 2 years ago
Alternatives and similar repositories for Community
Users that are interested in Community are comparing it to the libraries listed below
Sorting:
- ☆14Dec 3, 2022Updated 3 years ago
- This repository stores content that can be used to design a Rapid Threat Model Prototyping process for a software development group.☆165Mar 14, 2023Updated 2 years ago
- gRPC / gRPC-Web Pentest Practicing Lab☆10Aug 29, 2023Updated 2 years ago
- The Open Security Summit is focused on the collaboration between, Developers and Application Security☆45Jul 9, 2025Updated 7 months ago
- ☆10Aug 8, 2015Updated 10 years ago
- Plugin for GoCD server that will spin up and shut down EC2 instances as its agent workers on demand☆14Apr 26, 2024Updated last year
- Template repo for Conjur repositories☆17Nov 3, 2025Updated 3 months ago
- python3 scripts to help with aws triage needs☆15Feb 11, 2022Updated 4 years ago
- ☆15Jul 9, 2020Updated 5 years ago
- This is a SOAP service written in C# that has intentional SQL injection vulnerabilties.☆21Nov 27, 2016Updated 9 years ago
- Proof of concept to use wifi beacons and RSSI (power signals) abuse to detect people forthcoming.☆13Mar 7, 2015Updated 10 years ago
- BDD Automated Security Tests for Web Applications☆568Nov 16, 2022Updated 3 years ago
- PGPCrack-NG is a program designed to brute-force symmetrically encrypted PGP files. It is a replacment for the long dead PGPCrack.☆24Oct 30, 2017Updated 8 years ago
- Crackme challenge☆17Nov 20, 2020Updated 5 years ago
- Externalize Java application access to protected resources as log messages.☆43Jan 22, 2026Updated last month
- Mobile Security testing Framework☆41Sep 11, 2018Updated 7 years ago
- Vulnerable Task Manager☆22Jan 14, 2025Updated last year
- A Pythonic framework for threat modeling☆1,108Feb 24, 2026Updated last week
- Segment's Threat Modeling training for our engineers☆245May 4, 2021Updated 4 years ago
- Tools related to work with Attack Flow (https://github.com/center-for-threat-informed-defense/attack-flow)☆44Jun 6, 2022Updated 3 years ago
- Vulnerable ASP based Web Application☆18Jan 25, 2019Updated 7 years ago
- ☆26Jul 9, 2024Updated last year
- A Java library for parsing and programmatically using threat models☆82Feb 15, 2023Updated 3 years ago
- A tool for auditing medical devices and healthcare infrastructure☆22Dec 28, 2025Updated 2 months ago
- ☆18Nov 6, 2016Updated 9 years ago
- A MAL language that demonstrates the Maven project structure☆23Feb 24, 2026Updated last week
- Checklist intended to be used as a baseline for assessing, designing, and testing the security of a MAM (Application Wrapping) solution☆20Sep 2, 2015Updated 10 years ago
- A proof of concept project that demonstrates oWASP.org's top 10 web vulnerabilities☆21Jun 22, 2015Updated 10 years ago
- Making transparency normal!☆24Dec 18, 2023Updated 2 years ago
- ☆71Jul 24, 2025Updated 7 months ago
- DirBuster successor in Erlang☆37Feb 16, 2017Updated 9 years ago
- A curated list of threat modeling resources (Books, courses - free and paid, videos, tools, tutorials and workshops to practice on ) for …☆18Mar 13, 2024Updated last year
- A collection of tools that deal with crypto and cryptanalysis. For educational purposes only. These tools are likely not a good substitut…☆24May 30, 2018Updated 7 years ago
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆181Dec 11, 2025Updated 2 months ago
- truffleproc — hunt secrets in process memory (TruffleHog & gdb mashup)☆123Aug 20, 2023Updated 2 years ago
- Bypass Constrained Language Mode in PowerShell☆29May 21, 2019Updated 6 years ago
- 💣 REST and SOAP web API fuzzer☆25May 17, 2016Updated 9 years ago
- POC in order to materialize CSRF prevention concepts described in the following OWASP CSRF cheatsheet☆30May 25, 2017Updated 8 years ago
- Exploits for the TryHackMe room hackerNote☆32Feb 20, 2020Updated 6 years ago