- Notifications
You must be signed in to change notification settings - Fork1
A cyber security-focused playing card game
License
CC-BY-SA-4.0, Unknown licenses found
Licenses found
dxc-technology/ThreatDeck
Folders and files
Name | Name | Last commit message | Last commit date | |
---|---|---|---|---|
Repository files navigation
ThreatDeck byDXC Technology is licensed under aCreative Commons Attribution-ShareAlike 4.0 International License.Based on a work athttps://github.com/dxc-technology/ThreatDeck.
This repository holds the source files to theaward winning DXC ThreatDeck Security playing card game. The latest release can be found inreleases, with the print materials in theThreatDeck.zip
asset.
Game rules and instructions can be found inRULES.md andINSTRUCTIONS.md respectively.
Extract theThreatDeck.zip
archive.
Print all PDFs in the root folder as a manually duplexed print job — the alignment on automatic duplexers seem to have rather poor tolerances being approximately 2-3 mm out on both axes, you may have better success with a local reprographics department or commercial print shop.
Consumer / business grade printers limit cardstock options to the 200 gsm grammage / area density range, professional-grade playing cards are typically between 300 and 350 gsm, therefore if you desire a more professional level of stock feel and weight, you may wish to seek the services of a commercial print shop.
The cards have 5 mm bleed and include crop marks and trim lines for die-cutting, seeinstructions below for building cards without crop marks and trim lines. Dedicated crop marks and trim lines are available separately in thecrops
andtrims
directories of the archive.
The SVGs insrc are best edited inInkscape (a free open-source WYSIWYG SVG editor) or another vector graphics editor, whilst you can try updating the SVGs by hand, you will likely encounter challenges with how to wrap text.
If you wish to build the project please follow these instructions to build PDFs from the source SVGs.
- DownloadDocker Desktop 🐳
- Clone this repository to your local machine ⬇
- Open a terminal 💻
cd
into the cloned directory. 📁- Build the docker image by running
docker build --tag threatdeck .
, grab a coffee, this can take five minutes ☕ - Run the container using
docker run -v $(pwd):/usr/ThreatDeck threatdeck
on Linux ordocker run -v %cd%:/usr/ThreatDeck threatdeck
on Windows. 🏃♂️ - After ~10 minutes
ThreatDeck.zip
will be produced in./dist
. 🚀
The build process accepts the following optional arguments:
-m
produces a four up layout with four cards per page, thus saving paper, note that it assumes duplexing along the long edge of a portrait page.-c
lays out elements with crop marks.-t
lays out elements with trim lines.-f
lays out elements with fold lines (where appropriate).
Use the following syntax to use these optional argumentsdocker run -v $(pwd):/usr/ThreatDeck threatdeck -mctf
.
This work is licensed under aCreative Commons Attribution-ShareAlike 4.0 International License.
About
A cyber security-focused playing card game
Topics
Resources
License
CC-BY-SA-4.0, Unknown licenses found
Licenses found
Uh oh!
There was an error while loading.Please reload this page.
Stars
Watchers
Forks
Contributors2
Uh oh!
There was an error while loading.Please reload this page.