alexdevassy / AI-Powered-Vulnerability-Impact-Analyzer
Vulnerability impact analyzer that reduces false positives in SCA tools by performing intelligent code analysis. Uses agentic AI with open source models to understand CVEs and verify actual vulnerability impact in your codebase. Keeps your code secure with on-premises execution and human-in-the-loop verification.
☆54Updated 2 months ago
Alternatives and similar repositories for AI-Powered-Vulnerability-Impact-Analyzer
Users that are interested in AI-Powered-Vulnerability-Impact-Analyzer are comparing it to the libraries listed below
Sorting:
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆76Updated last week
- An experimental project using LLM technology to generate security documentation for Open Source Software (OSS) projects☆28Updated 2 months ago
- ☆41Updated 2 months ago
- A fun POC that is built to understand AI security agents.☆31Updated 4 months ago
- Cloud Offensive Breach and Risk Assessment (COBRA) Tool☆92Updated 2 months ago
- ☆36Updated 4 months ago
- One Conference 2024☆109Updated 7 months ago
- Offensive Kubernetes Threat Matrix -- kubenomicon.com☆39Updated 4 months ago
- A Model Context Protocol server that connects AI assistants like Claude to AWS security services, allowing them to autonomously query, in…☆39Updated 2 weeks ago
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆94Updated last year
- GCP GOAT is the vulnerable application for learn the GCP Security☆64Updated last year
- Public repository of all things cloud security.☆41Updated 7 months ago
- A full insecure kubernetes application for testing security tools☆86Updated 3 weeks ago
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆194Updated this week
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆140Updated 4 months ago
- LLM Testing Findings Templates☆72Updated last year
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆58Updated last year
- A comprehensive knowledge base for security professionals to keep track of and build defenses against API attack techniques.☆43Updated 8 months ago
- A comprehensive checklist and guide for organizations looking to implement a robust cybersecurity program☆27Updated this week
- ☆40Updated 2 months ago
- An index of publicly available and open-source threat detection rulesets.☆72Updated 3 weeks ago
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆75Updated last year
- A small tool to help developers understand a huge set of security requirements from appsec teams☆45Updated 2 years ago
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆64Updated 10 months ago
- A PoC to Simulate Ransomware Attack on AWS Environment☆31Updated 7 months ago
- AI featured threat modeling and security review action☆43Updated 5 months ago
- NOVA: The Prompt Pattern Matching☆80Updated 2 weeks ago
- IMDSPOOF is a cyber deception tool that spoofs the AWS IMDS service to return HoneyTokens that can be alerted on.☆102Updated last year
- ☆33Updated 6 months ago
- This provides a guided step by step walkthrough for threat modeling with MITRE ATT&CK Framework☆28Updated 3 months ago