Vulnerability impact analyzer that reduces false positives in SCA tools by performing intelligent code analysis. Uses agentic AI with open source models to understand CVEs and verify actual vulnerability impact in your codebase. Keeps your code secure with on-premises execution and human-in-the-loop verification.
☆66Feb 22, 2025Updated last year
Alternatives and similar repositories for AI-Powered-Vulnerability-Impact-Analyzer
Users that are interested in AI-Powered-Vulnerability-Impact-Analyzer are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆20Apr 10, 2025Updated last year
- GenAI-STIX2.1-Generator is a tool that leverages Azure OpenAI capabilities to transform threat intelligence reports from unstructured web…☆24Mar 24, 2025Updated last year
- An experimental project using LLM technology to generate security documentation for Open Source Software (OSS) projects☆37Feb 28, 2025Updated last year
- A simple web app to get the latest EPSS data for a CVE ID☆12Dec 14, 2025Updated 4 months ago
- Rapidly identify and mitigate container security vulnerabilities with generative AI.☆207Feb 5, 2026Updated 2 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Extracts IoCs, TTPs and the relationships between them. Outputs a STIX 2.1 bundle.☆80Apr 17, 2026Updated last week
- Bring Your Own Mitre Att&ck © Matrix !☆13Oct 19, 2023Updated 2 years ago
- Implements Stripe Checkout as an Angular module.☆13Sep 5, 2018Updated 7 years ago
- A Shodan-based tool to discover publicly exposed Ollama instances and list available LLM models.☆22May 27, 2025Updated 11 months ago
- Cybether - A modern, open-source Cybersecurity Governance, Risk, and Compliance (GRC) dashboard☆89Dec 14, 2025Updated 4 months ago
- A fun POC that is built to understand AI security agents.☆34Oct 30, 2025Updated 5 months ago
- HTTP Request Translator (hrt) translates raw HTTP requests to different scripts (bash, python, etc.)☆17Feb 24, 2017Updated 9 years ago
- AWS audits, without screenshots☆36Apr 22, 2026Updated last week
- Hands-on workshop on how to build security automation in pipelines☆37Apr 22, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Powerful LLM Query Framework with YAML Prompt Templates. Made for Automation☆34Sep 20, 2025Updated 7 months ago
- A static code analysis tool☆18Mar 17, 2025Updated last year
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆107Oct 13, 2025Updated 6 months ago
- CloudSec Tools is a curated collection of open-source cloud security tools, helping security professionals, researchers, and engineers fi…☆22Apr 21, 2026Updated last week
- A not-curated list of cloud hacking labs☆26Apr 18, 2024Updated 2 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆11Oct 29, 2018Updated 7 years ago
- Advanced PDF parsing for python☆12Jan 21, 2025Updated last year
- A Kubectl plugin to allow to compare a known valid reference configuration and a set of specific cluster configuration CRs.☆20Apr 22, 2026Updated last week
- A malicious KeePass plugin to exfiltrate the master key.☆16Oct 25, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- An LLM for CTI reports - to be presented at FIRST Fukuoka 2024☆23Jan 26, 2026Updated 3 months ago
- Application Security Vulnerability Periodic Table☆14Aug 25, 2014Updated 11 years ago
- Extract machine readable cyber threat intelligence from unstructured data (inc. PDFs, Word docs, and HTML pages)☆38Apr 22, 2026Updated last week
- Safer AWS SCP deployments via real-time monitoring☆56Sep 30, 2023Updated 2 years ago
- ☆21Jan 29, 2025Updated last year
- Small tool to decode ASP.NET __VIEWSTATE variable when doing webpentests☆15Feb 27, 2021Updated 5 years ago
- Provide a sort of shell-ish interface to make file directory traversal quicker and easier.☆24Jan 1, 2017Updated 9 years ago
- Tool for obfuscating and deobfuscating data.☆77Mar 20, 2024Updated 2 years ago
- Extract the keyboard input from wireshark datapack | 一键提取wireshark中的键盘输入☆15Jul 29, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Jenkins Security Research or Hacking Jenkins ;)☆12Dec 10, 2024Updated last year
- ☆121May 26, 2025Updated 11 months ago
- source for llmsec.net☆16Jul 24, 2024Updated last year
- A central place to keep track of relevant BountyMachine talks, blogs, and interesting things!☆34Nov 17, 2018Updated 7 years ago
- Web application pentesting recon☆23Jul 25, 2020Updated 5 years ago
- Handbook for Octokit maintainers and GitHub integrators☆12Mar 21, 2024Updated 2 years ago
- ☆58Apr 12, 2026Updated 2 weeks ago