Vulnerability impact analyzer that reduces false positives in SCA tools by performing intelligent code analysis. Uses agentic AI with open source models to understand CVEs and verify actual vulnerability impact in your codebase. Keeps your code secure with on-premises execution and human-in-the-loop verification.
☆64Feb 22, 2025Updated last year
Alternatives and similar repositories for AI-Powered-Vulnerability-Impact-Analyzer
Users that are interested in AI-Powered-Vulnerability-Impact-Analyzer are comparing it to the libraries listed below
Sorting:
- A simple web app to get the latest EPSS data for a CVE ID☆12Dec 14, 2025Updated 2 months ago
- Text Match Cut Video Generator Web App☆36Feb 19, 2026Updated 2 weeks ago
- An experimental project using LLM technology to generate security documentation for Open Source Software (OSS) projects☆34Feb 28, 2025Updated last year
- A catalog of services that can be publicly exposed within different cloud providers.☆14Aug 30, 2024Updated last year
- Extracts IoCs, TTPs and the relationships between them. Outputs a STIX 2.1 bundle.☆79Feb 27, 2026Updated last week
- Performing secure code review with LLMs (and vibe coding IDEs)☆36Aug 5, 2025Updated 7 months ago
- Cybether - A modern, open-source Cybersecurity Governance, Risk, and Compliance (GRC) dashboard☆87Dec 14, 2025Updated 2 months ago
- GenAI-STIX2.1-Generator is a tool that leverages Azure OpenAI capabilities to transform threat intelligence reports from unstructured web…☆24Mar 24, 2025Updated 11 months ago
- Various AD tools needed for penetration testing in one place.☆23Jul 13, 2023Updated 2 years ago
- Safer AWS SCP deployments via real-time monitoring☆56Sep 30, 2023Updated 2 years ago
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆104Oct 13, 2025Updated 4 months ago
- U-Transkript is a powerful Python library for automatically extracting transcripts (subtitles) from YouTube videos and translating them i…☆13Feb 16, 2026Updated 2 weeks ago
- Provide a sort of shell-ish interface to make file directory traversal quicker and easier.☆24Jan 1, 2017Updated 9 years ago
- Scripts to quickly fix security and compliance issues☆28Feb 9, 2026Updated 3 weeks ago
- tool designed for identifying vulnerabilities in open source codebases at scale. It can gather and filter on key repository metrics such …☆235Feb 6, 2025Updated last year
- A network logging tool that logs per process activities☆32Jun 13, 2023Updated 2 years ago
- A central place to keep track of relevant BountyMachine talks, blogs, and interesting things!☆34Nov 17, 2018Updated 7 years ago
- Another Repo of Malware. Enjoy. <3☆60Feb 27, 2019Updated 7 years ago
- ☆11Feb 9, 2023Updated 3 years ago
- Pickleib helps automate tests for WebUI, MobileUI, Desktop UI, API, Email, DataBase, Localisation and more!☆12Updated this week
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆128Apr 6, 2024Updated last year
- ☆120May 26, 2025Updated 9 months ago
- ☆96Jan 7, 2026Updated 2 months ago
- 🛡️ SIGMA Detection Engineering Platform A comprehensive AI-powered detection engineering platform for security teams to explore MITRE AT…☆45Jun 28, 2025Updated 8 months ago
- All the principles of the AI modular structure that generates malicious code fragments sold on the dark web☆69Apr 30, 2024Updated last year
- TTPMapper is an AI-driven threat intelligence parser that converts unstructured reports whether from web URLs or PDF files into structure…☆51Jun 21, 2025Updated 8 months ago
- AI-powered terminal assistant that transforms command failures into learning opportunities. Automatically detects errors, analyzes contex…☆76Sep 4, 2025Updated 6 months ago
- A highly available AWS deployment of the Threat Intelligence platform, OpenCTI using Terraform. Native AWS resources are used where feasi…☆39Apr 23, 2023Updated 2 years ago
- 该工具作用是快速造数据,按照你想要的规则将造好的测试数据存入csv,方便postman,jmeter等工具做接口自动化 我们知道当我们做接口自动化的时候,制作入参的csv表格手动填写很麻烦,特别是当项目某个字段的规则变了以后,那么所有涉及到这个字段的正常和异常用例数据可能都…☆11May 18, 2019Updated 6 years ago
- A security tool designed to help review merged code changes to open source maintained repositories via LLM assisted review to safeguard a…☆32Oct 20, 2024Updated last year
- Automated Information Retrieval From APKs For Initial Analysis☆33Oct 2, 2017Updated 8 years ago
- Disclaimer: Please note that these materials are public available in several reference websites. These materials are not only the source …☆13Dec 31, 2023Updated 2 years ago
- Fix bugs, create user stories, create PRDs, manage sprints - by AI.☆15Apr 17, 2025Updated 10 months ago
- 专门用于视觉丰富 文档(VRDs)的大模型RAG系统☆13Feb 11, 2025Updated last year
- Spotter is a comprehensive Kubernetes security scanner that uses CEL-based rules to identify security vulnerabilities, misconfigurations,…☆71Sep 13, 2025Updated 5 months ago
- Lightweight macOS detection agent built on Santa’s Endpoint Security telemetry.☆105Dec 3, 2025Updated 3 months ago
- Dusseldorf is an out-of-band security tool to help in security research.☆50Updated this week
- AIL project training materials☆39Feb 24, 2026Updated last week
- ☆34May 24, 2023Updated 2 years ago