Pin designs for security related items
☆37Feb 16, 2026Updated 2 weeks ago
Alternatives and similar repositories for security-pins
Users that are interested in security-pins are comparing it to the libraries listed below
Sorting:
- Equal Experts Secure Delivery Playbook☆26Feb 21, 2023Updated 3 years ago
- This Repository contains the stable beta preview of the next major secureCodeBox (SCB) release v2.0.0.☆23Oct 14, 2020Updated 5 years ago
- This is a working copy of the OWASP Project Handbook and is the draft where changes are made before publishing a final version on the OWA…☆18Feb 22, 2017Updated 9 years ago
- German translation of the Microsoft Elevation of Privilege card game along with notes and examples☆10Jan 9, 2016Updated 10 years ago
- ☆13May 30, 2017Updated 8 years ago
- Traze is a simple tron-like multi client online game serving as a playground for exploring new technologies.☆13Dec 31, 2019Updated 6 years ago
- Kantega Web Application Security Hero Challenge☆19Dec 3, 2020Updated 5 years ago
- ☆25Mar 28, 2018Updated 7 years ago
- ☆14May 27, 2021Updated 4 years ago
- A tool for analyzing the attack surface of an application☆19Mar 5, 2025Updated last year
- ☆14Apr 23, 2019Updated 6 years ago
- An interactive way to learn threat modeling☆17Feb 14, 2019Updated 7 years ago
- Ransomware base in Java for all operating systems☆19Jun 13, 2017Updated 8 years ago
- A Continuous Threat Modeling methodology☆324Jun 24, 2022Updated 3 years ago
- 🥋 Framework for continuously improving the IT-Security of your teams through gamification and self-assessment.☆85Dec 10, 2022Updated 3 years ago
- Javascript Code Injection for Debugging☆20Nov 11, 2023Updated 2 years ago
- OWASP SecurityRAT (version 1.x) - Tool for handling security requirements in development☆186Aug 28, 2025Updated 6 months ago
- The challenge toolbox is a small component which allows you to create, run and check new challenges locally.☆27Mar 11, 2024Updated last year
- ☆21Sep 25, 2018Updated 7 years ago
- Azure DevOps extensions from CSE DevOps team☆27Jul 12, 2023Updated 2 years ago
- Caterpillar is a security scanning library for AI agent skill files (e.g., Claude Code skills) for dangerous or malicious behavior☆33Feb 16, 2026Updated 2 weeks ago
- MIRO - Merge it robot!☆25Feb 23, 2021Updated 5 years ago
- ☆28Mar 29, 2024Updated last year
- OWASP ASVS Assessment Tool☆28Nov 6, 2018Updated 7 years ago
- CVE database☆21Sep 2, 2020Updated 5 years ago
- A simple web app that helps developers understand the ASVS requirements. Now supporting ASVS 5.0☆163Nov 25, 2025Updated 3 months ago
- Demo - how to easily build security testing for Web App, using Zap and Glue☆61Apr 26, 2021Updated 4 years ago
- A library to assist in security-testing Unicode enabled applications during fuzzing, XSS, SQLi, etc.☆42Jul 1, 2017Updated 8 years ago
- Demonstrates how a malicious dependency could negatively impact the build output.☆25Aug 11, 2023Updated 2 years ago
- Security contract types☆60Oct 4, 2022Updated 3 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆67Apr 11, 2023Updated 2 years ago
- EZGHSA is a command-line tool for summarizing and filtering vulnerability alerts on Github repositories.☆35Jan 4, 2026Updated 2 months ago
- Proof of concept implementation of fuzzing workload using AFL as the fuzzer and Terraform to codify infrastructure☆31Aug 22, 2019Updated 6 years ago
- Automate the AWS GuardDuty account invitation lifecycle for all of your organizations AWS accounts in all regions as well as aggregate an…☆66Apr 10, 2023Updated 2 years ago
- ☆28Aug 6, 2020Updated 5 years ago
- MCP Snitch is a macOS application that intercepts and monitors MCP server communications, providing security analysis, access control, an…☆93Oct 14, 2025Updated 4 months ago
- Cracker for Apache.lang.commons RandomStringUtils(). Code for "The Java Soothsayer" talk at EkoParty 2017 by Alejo Popovici.☆33Mar 13, 2018Updated 7 years ago
- Spotter is a comprehensive Kubernetes security scanner that uses CEL-based rules to identify security vulnerabilities, misconfigurations,…☆71Sep 13, 2025Updated 5 months ago
- ☆69Jul 18, 2025Updated 7 months ago