alexdevassy / AI-Powered-Vulnerability-Impact-AnalyzerLinks
Vulnerability impact analyzer that reduces false positives in SCA tools by performing intelligent code analysis. Uses agentic AI with open source models to understand CVEs and verify actual vulnerability impact in your codebase. Keeps your code secure with on-premises execution and human-in-the-loop verification.
☆63Updated 11 months ago
Alternatives and similar repositories for AI-Powered-Vulnerability-Impact-Analyzer
Users that are interested in AI-Powered-Vulnerability-Impact-Analyzer are comparing it to the libraries listed below
Sorting:
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆102Updated 4 months ago
- An experimental project using LLM technology to generate security documentation for Open Source Software (OSS) projects☆34Updated 11 months ago
- ☆61Updated 8 months ago
- Cloud Offensive Breach and Risk Assessment (COBRA) Tool☆102Updated 2 weeks ago
- ☆38Updated last year
- A fun POC that is built to understand AI security agents.☆34Updated 3 months ago
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆68Updated 7 months ago
- ☆44Updated 3 months ago
- AI Security Shared Responsibility Model☆88Updated 4 months ago
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆101Updated 2 years ago
- Summaries, transcripts, key points, and other useful insights from fwd:cloudsec 2025 talks for those of us who don't have time to watch e…☆85Updated 7 months ago
- GCP GOAT is the vulnerable application for learn the GCP Security☆70Updated 8 months ago
- One Conference 2024☆111Updated last year
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆141Updated last year
- AI featured threat modeling and security review project☆17Updated last year
- ☆367Updated 4 months ago
- LLM Testing Findings Templates☆75Updated last year
- Maturity Model Collaborative project☆15Updated 2 years ago
- A Model Context Protocol server that connects AI assistants like Claude to AWS security services, allowing them to autonomously query, in…☆81Updated 6 months ago
- An AI-powered tool for discovering privilege escalation opportunities in AWS IAM configurations.☆117Updated last week
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆215Updated this week
- Reference notes for Attacking and Defending Generative AI presentation☆69Updated last year
- AI featured threat modeling and security review action☆45Updated last year
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆83Updated last year
- ☆41Updated last year
- A comprehensive checklist and guide for organizations looking to implement a robust cybersecurity program☆46Updated last week
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆59Updated 2 years ago
- Cloud Commotion intends to cause chaos to simulate security incidents☆145Updated last year
- ☆43Updated 5 months ago
- RansomWhen is a tool to enumerate identities that can lock S3 Buckets using KMS, resulting in ransomwares, as well as detect occurances o…☆60Updated last year