alexdevassy / AI-Powered-Vulnerability-Impact-AnalyzerLinks
Vulnerability impact analyzer that reduces false positives in SCA tools by performing intelligent code analysis. Uses agentic AI with open source models to understand CVEs and verify actual vulnerability impact in your codebase. Keeps your code secure with on-premises execution and human-in-the-loop verification.
☆55Updated 4 months ago
Alternatives and similar repositories for AI-Powered-Vulnerability-Impact-Analyzer
Users that are interested in AI-Powered-Vulnerability-Impact-Analyzer are comparing it to the libraries listed below
Sorting:
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆89Updated 2 months ago
- An experimental project using LLM technology to generate security documentation for Open Source Software (OSS) projects☆31Updated 4 months ago
- A fun POC that is built to understand AI security agents.☆31Updated 6 months ago
- ☆58Updated last month
- ☆41Updated 4 months ago
- ☆17Updated 3 months ago
- GCP GOAT is the vulnerable application for learn the GCP Security☆64Updated last month
- Cloud Offensive Breach and Risk Assessment (COBRA) Tool☆92Updated last month
- LLM Testing Findings Templates☆72Updated last year
- ☆274Updated 2 weeks ago
- ☆19Updated 3 years ago
- TTPMapper is an AI-driven threat intelligence parser that converts unstructured reports whether from web URLs or PDF files into structure…☆35Updated 3 weeks ago
- Code Repository for: AIRTBench: Measuring Autonomous AI Red Teaming Capabilities in Language Models☆61Updated this week
- A simple web app to get the latest EPSS data for a CVE ID☆11Updated 3 months ago
- Reference notes for Attacking and Defending Generative AI presentation☆64Updated 11 months ago
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆65Updated 3 weeks ago
- RansomWhen is a tool to enumerate identities that can lock S3 Buckets using KMS, resulting in ransomwares, as well as detect occurances o…☆55Updated 5 months ago
- NOVA: The Prompt Pattern Matching☆128Updated 2 months ago
- Collection of Docker honeypot logs from 2021 - 2024☆36Updated 9 months ago
- ☆85Updated 2 months ago
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆142Updated 6 months ago
- InfoSec OpenAI Examples☆19Updated last year
- ☆37Updated 6 months ago
- A Model Context Protocol server that connects AI assistants like Claude to AWS security services, allowing them to autonomously query, in…☆62Updated 3 weeks ago
- Blogpost series showcasing interesting cloud - web app security bugs☆49Updated 2 years ago
- An LLM and OCR based Indicator of Compromise Extraction Tool☆33Updated 7 months ago
- ☆39Updated 7 months ago
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆99Updated last year
- A PoC to Simulate Ransomware Attack on AWS Environment☆32Updated 9 months ago
- ☆56Updated 2 years ago