Dragon-GPT uses Chat-GPT, or local LLM, to execute automatic and AI-powered threat modeling analysis on a given OWASP Threat Dragon diagram.
☆41Jun 20, 2025Updated 9 months ago
Alternatives and similar repositories for dragon-gpt
Users that are interested in dragon-gpt are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- AI featured threat modeling and security review project☆17Nov 17, 2024Updated last year
- OWASP Threat Dragon with Gitlab Integration☆27Nov 6, 2017Updated 8 years ago
- OWASP Threat Dragon core files☆11Jan 26, 2026Updated 2 months ago
- Fork Threat Modeling Platform - Community☆28Oct 10, 2025Updated 5 months ago
- ☆17Feb 3, 2026Updated last month
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- ☆19Dec 17, 2025Updated 3 months ago
- A powerful Burp Suite extension that imports Postman collections☆31Aug 1, 2025Updated 7 months ago
- OWASP Foundation Web Respository☆17Jun 1, 2022Updated 3 years ago
- A small tool to help developers understand a huge set of security requirements from appsec teams☆46Sep 2, 2022Updated 3 years ago
- Coleção de informações sobre POS's disponíveis no mercado Brasileiro, com propósito educativo.☆11Sep 6, 2020Updated 5 years ago
- Presentation Slides and Resources☆16Jun 12, 2024Updated last year
- "RansomPKP" proof of concept.☆11Aug 8, 2016Updated 9 years ago
- Burp Suite Extension for inserting a magic byte into responder's request☆24Sep 22, 2023Updated 2 years ago
- Standalone Satellite Tracker Project based on ESP32 and Micropython☆12Aug 20, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- OWASP Project Developer Guide - Document and Project Web pages☆116Updated this week
- Sample exploits of common vulnerabilities in Java librarires☆27Dec 14, 2023Updated 2 years ago
- An auto-scoring capture-the-flag game focusing on TOCTOU vulnerabilities☆21Oct 28, 2020Updated 5 years ago
- A Terraform module with a collection of common TLS certificate settings.☆12Sep 27, 2017Updated 8 years ago
- A Pythonic framework for threat modeling☆1,113Mar 16, 2026Updated last week
- Capgemini UK Software Engineering Grade Ladder☆12Apr 12, 2023Updated 2 years ago
- Vulnerable Android application for Ostolab Security Scanner☆35Jan 30, 2026Updated last month
- BurpJDSer-ng☆29Mar 19, 2026Updated last week
- Moovbox Mismanagement Utilities☆15Mar 21, 2015Updated 11 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Design resources for developers is a selection of more than 400 sites to facilitate developers.☆13Dec 8, 2022Updated 3 years ago
- Regex patterns for manual application source code review☆33Dec 14, 2020Updated 5 years ago
- Top 2025 Vulnerabilities You Shouldn’t Accept in a Pentest Report☆14Feb 6, 2025Updated last year
- Burp Suite Pro extension☆11May 26, 2017Updated 8 years ago
- ☆569Updated this week
- ☆17Aug 23, 2017Updated 8 years ago
- toolings for pentester to makes their life easier☆11Feb 25, 2023Updated 3 years ago
- A Productivity-Boosting Burp Suite extension written in Kotlin that enables persistent sticky session handling in web application testing…☆12Oct 8, 2025Updated 5 months ago
- Automated phishing catcher☆12Nov 27, 2025Updated 4 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ☆35Mar 8, 2022Updated 4 years ago
- ☆13Aug 10, 2022Updated 3 years ago
- This extension provide a Python panel for writing custom proxy script.☆16Aug 26, 2019Updated 6 years ago
- Automatic tool using for crawling code to find low-hang fruit vulnerabilities - Based on OWASP Secure Code Review Guide☆21Aug 31, 2020Updated 5 years ago
- ☆37Jun 20, 2025Updated 9 months ago
- OWASP Foundation Web Respository☆19Dec 22, 2025Updated 3 months ago
- ☆17Jun 2, 2015Updated 10 years ago