LuizBoina / dragon-gptView external linksLinks
Dragon-GPT uses Chat-GPT, or local LLM, to execute automatic and AI-powered threat modeling analysis on a given OWASP Threat Dragon diagram.
☆41Jun 20, 2025Updated 7 months ago
Alternatives and similar repositories for dragon-gpt
Users that are interested in dragon-gpt are comparing it to the libraries listed below
Sorting:
- OWASP Threat Dragon with Gitlab Integration☆27Nov 6, 2017Updated 8 years ago
- OWASP Threat Dragon core files☆11Jan 26, 2026Updated 3 weeks ago
- Fork Threat Modeling Platform - Community☆27Oct 10, 2025Updated 4 months ago
- Standalone Satellite Tracker Project based on ESP32 and Micropython☆12Aug 20, 2020Updated 5 years ago
- A small tool to help developers understand a huge set of security requirements from appsec teams☆46Sep 2, 2022Updated 3 years ago
- AI featured threat modeling and security review project☆17Nov 17, 2024Updated last year
- Vulnerable Android application for Ostolab Security Scanner☆35Jan 30, 2026Updated 2 weeks ago
- Create subdomains and files wordlists from your browser history☆13Jan 10, 2023Updated 3 years ago
- CI Pipeline with Pixi, the WAF OWASP Core Rule Set and TestCafe tests.☆15Jun 9, 2021Updated 4 years ago
- Simple mind maps for IoT security attack surfaces and methodologies☆17Aug 12, 2019Updated 6 years ago
- Collection of fuzzing payloads and corpus from all around added as sub modules☆15May 17, 2025Updated 8 months ago
- some codeql rules☆15Apr 6, 2020Updated 5 years ago
- Windows HTTP协议栈远程代码执行漏洞 CVE-2021-31166☆19Nov 4, 2021Updated 4 years ago
- PowerShell script for hardening GE digital CIMPLICITY servers☆23Aug 12, 2021Updated 4 years ago
- ZIP 💣 httpd. Just a gift for scanners and bots.☆21Jul 13, 2017Updated 8 years ago
- Automatic tool using for crawling code to find low-hang fruit vulnerabilities - Based on OWASP Secure Code Review Guide☆21Aug 31, 2020Updated 5 years ago
- An AI-powered threat modeling tool that leverages OpenAI's GPT models to generate threat models for a given application based on the STRI…☆979Dec 28, 2025Updated last month
- Provides a generator that installs everything you need for a secure passwordless and two-factor authentication flow using WebAuthn, built…☆37Dec 3, 2025Updated 2 months ago
- Sample exploits of common vulnerabilities in Java librarires☆27Dec 14, 2023Updated 2 years ago
- Burp Suite Extension for inserting a magic byte into responder's request☆24Sep 22, 2023Updated 2 years ago
- ☆84May 1, 2023Updated 2 years ago
- Vecna is a Python chatbot which recommends songs and movies depending upon your feelings☆11Jun 28, 2022Updated 3 years ago
- ESP32 Remote JTAG Host for programming FPGAs☆28Sep 28, 2020Updated 5 years ago
- Regex patterns for manual application source code review☆33Dec 14, 2020Updated 5 years ago
- An experimental project using LLM technology to generate security documentation for Open Source Software (OSS) projects☆34Feb 28, 2025Updated 11 months ago
- Oracle Database Penetration Testing Reference (10g/11g)☆40Jul 28, 2018Updated 7 years ago
- Nessus Cheat Sheet in HTML, PDF, PNG, ADOC