OWASP / www-project-non-human-identities-top-10
OWASP Non-Human Identities Top 10
β11Updated this week
Alternatives and similar repositories for www-project-non-human-identities-top-10:
Users that are interested in www-project-non-human-identities-top-10 are comparing it to the libraries listed below
- A fun POC that is built to understand AI security agents.β21Updated last month
- π€ A GitHub action that leverages fabric patterns through an agent-based approachβ14Updated 3 weeks ago
- Build a CVE library with aggregated CISA, EPSS and CVSS dataβ27Updated last year
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projectsβ25Updated this week
- InfoSec OpenAI Examplesβ19Updated last year
- a hackbot proof-of-conceptβ37Updated 11 months ago
- An LLM and OCR based Indicator of Compromise Extraction Toolβ32Updated last month
- AIGoat: A deliberately Vulnerable AI Infrastructure. Learn AI security through solving our challenges.β183Updated 4 months ago
- LLM Testing Findings Templatesβ66Updated 11 months ago
- OWASP Foundation Web Respositoryβ19Updated 3 weeks ago
- β38Updated 9 months ago
- Maturity Model Collaborative projectβ14Updated last year
- β32Updated 5 months ago
- HashiCorp-relevant rules for the Semgrep code analysis toolβ39Updated last year
- Semgrep-based Policy Controller for Kubernetesβ45Updated this week
- β34Updated last month
- Security tool against dependency typosquatting attacksβ39Updated this week
- CLI tool for interacting with GPT, analyze local files, etc.β15Updated 7 months ago
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. β¦β61Updated 7 months ago
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the β¦β65Updated 7 months ago
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrixβ59Updated last year
- A CLI wrapper for libmodsecurity (v3.0.10)β11Updated last year
- Tool for obfuscating and deobfuscating data.β67Updated 10 months ago
- β58Updated last year
- Curating Falco rules with MITRE ATT&CK Matrixβ77Updated 10 months ago
- GCP GOAT is the vulnerable application for learn the GCP Securityβ63Updated last year
- Nuclei plugins to audit Chrome extensionsβ64Updated 6 months ago
- Static code analyser for backdoors and malicious code in git repos using OpenAI compatible LLM APIsβ71Updated 10 months ago
- Defending IaaS with ATT&CK is a project to create a collection of ATT&CK techniques relevant to a Linux IaaS environment, as well as a meβ¦β13Updated 11 months ago