alexdevassy / AI-Powered-Vulnerability-Impact-AnalyzerLinks
Vulnerability impact analyzer that reduces false positives in SCA tools by performing intelligent code analysis. Uses agentic AI with open source models to understand CVEs and verify actual vulnerability impact in your codebase. Keeps your code secure with on-premises execution and human-in-the-loop verification.
☆55Updated 3 months ago
Alternatives and similar repositories for AI-Powered-Vulnerability-Impact-Analyzer
Users that are interested in AI-Powered-Vulnerability-Impact-Analyzer are comparing it to the libraries listed below
Sorting:
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆80Updated 3 weeks ago
- An experimental project using LLM technology to generate security documentation for Open Source Software (OSS) projects☆28Updated 3 months ago
- ☆36Updated 5 months ago
- ☆54Updated this week
- ☆41Updated 3 months ago
- AI featured threat modeling and security review project☆16Updated 6 months ago
- A fun POC that is built to understand AI security agents.☆30Updated 5 months ago
- Cloud Offensive Breach and Risk Assessment (COBRA) Tool☆92Updated 2 weeks ago
- ☆40Updated last week
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆97Updated last year
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆75Updated last year
- ☆16Updated last month
- ☆33Updated 6 months ago
- Repo for experimenting and testing MCP server builds for CTI-related research.☆26Updated 3 weeks ago
- A comprehensive knowledge base for security professionals to keep track of and build defenses against API attack techniques.☆43Updated 8 months ago
- A simple web app to get the latest EPSS data for a CVE ID☆11Updated 2 months ago
- A Model Context Protocol server that connects AI assistants like Claude to AWS security services, allowing them to autonomously query, in…☆54Updated last week
- This provides a guided step by step walkthrough for threat modeling with MITRE ATT&CK Framework☆28Updated 3 months ago
- RansomWhen is a tool to enumerate identities that can lock S3 Buckets using KMS, resulting in ransomwares, as well as detect occurances o…☆49Updated 4 months ago
- One Conference 2024☆110Updated 8 months ago
- A full insecure kubernetes application for testing security tools☆87Updated last month
- LLM Testing Findings Templates☆72Updated last year
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆65Updated 11 months ago
- InfoSec OpenAI Examples☆19Updated last year
- OWASP Foundation Web Respository☆31Updated 2 years ago
- The Measure, Maximize, and Mature Threat-Informed Defense (M3TID) project defines what Threat-Informed Defense (TID) is and the key activ…☆16Updated last week
- ☆76Updated 3 weeks ago
- NOVA: The Prompt Pattern Matching☆111Updated last month
- A guide to simplify the process of evaluating Datadog's Cloud SIEM security capabilities to detect AWS threats.☆19Updated last year
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆199Updated this week