VerSprite / fork-communityLinks
Fork Threat Modeling Platform - Community
β20Updated last month
Alternatives and similar repositories for fork-community
Users that are interested in fork-community are comparing it to the libraries listed below
Sorting:
- π§ͺ Correlate Semgrep scans with Python test coverage to prioritize SAST findings and get bug fix suggestions via a self-hosted LLM.β39Updated 5 months ago
- A project to visualize the software supply chainβ52Updated last year
- InfoSec OpenAI Examplesβ19Updated last year
- Autoconfigured ELK Stack That Contains All EPSS and NVD CVE Dataβ51Updated last month
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. β¦β65Updated 11 months ago
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrixβ58Updated last year
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projectsβ80Updated 3 weeks ago
- β37Updated 6 months ago
- Vulnerable by Design AWS Cloud Development Kit (CDK) Infrastructureβ47Updated last year
- An experimental project using LLM technology to generate security documentation for Open Source Software (OSS) projectsβ28Updated 3 months ago
- A compilation of Software Supply Chain Security resources including initiatives, standards, regulations, organizations, vendors, tooling,β¦β135Updated last year
- This application was built to help reduce the amount of time it takes to review AWS Lambda code.β60Updated 6 months ago
- Create notes during a security code review in VSCode π Import your favorite SAST tool findings π οΈ and collaborate with others π€β133Updated 2 months ago
- ποΈ STRIDE vs. ASVS equivalence tableβ76Updated 9 months ago
- β36Updated 10 months ago
- WAF bypass PoCβ48Updated last year
- A PoC to Simulate Ransomware Attack on AWS Environmentβ31Updated 7 months ago
- EZGHSA is a command-line tool for summarizing and filtering vulnerability alerts on Github repositories.β35Updated 5 months ago
- β10Updated 3 years ago
- β31Updated last month
- β72Updated 3 weeks ago
- Official code for the paper entitled "Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense"β14Updated last month
- β73Updated 2 months ago
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where wβ¦β108Updated 6 months ago
- β52Updated 4 months ago
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.β53Updated 2 months ago
- Dragon-GPT uses Chat-GPT, or local LLM, to execute automatic and AI-powered threat modeling analysis on a given OWASP Threat Dragon diagrβ¦β35Updated 3 months ago
- β68Updated 4 months ago
- GCP GOAT is the vulnerable application for learn the GCP Securityβ64Updated 2 weeks ago
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).β75Updated last year