anshumanbh / cyber-safariLinks
A fun POC that is built to understand AI security agents.
☆32Updated 7 months ago
Alternatives and similar repositories for cyber-safari
Users that are interested in cyber-safari are comparing it to the libraries listed below
Sorting:
- An experimental project using LLM technology to generate security documentation for Open Source Software (OSS) projects☆31Updated 5 months ago
- LLM Testing Findings Templates☆72Updated last year
- Vulnerability impact analyzer that reduces false positives in SCA tools by performing intelligent code analysis. Uses agentic AI with ope…☆56Updated 5 months ago
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆90Updated 2 months ago
- InfoSec OpenAI Examples☆19Updated last year
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆65Updated last month
- GCP GOAT is the vulnerable application for learn the GCP Security☆64Updated 2 months ago
- ☆112Updated 2 years ago
- An LLM and OCR based Indicator of Compromise Extraction Tool☆33Updated 7 months ago
- ☆23Updated 10 months ago
- ☆56Updated 2 years ago
- ☆41Updated 5 months ago
- A framework for understanding the capabilities of automated detection methods at identifying classes of application security vulnerabilit…☆16Updated last month
- Maturity Model Collaborative project☆15Updated 2 years ago
- ☆58Updated 2 years ago
- ☆10Updated 3 years ago
- OWASP Foundation Web Respository☆9Updated last month
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆32Updated 3 years ago
- A PoC to Simulate Ransomware Attack on AWS Environment☆32Updated 9 months ago
- ☆61Updated 2 months ago
- ☆14Updated 2 years ago
- Blogpost series showcasing interesting cloud - web app security bugs☆49Updated 2 years ago
- A project to visualize the software supply chain☆52Updated last year
- Build a CVE library with aggregated CISA, EPSS and CVSS data☆27Updated last year
- ☆17Updated 3 months ago
- Short deep dive into Threat Hunting on AWS☆13Updated last year
- This application was built to help reduce the amount of time it takes to review AWS Lambda code.☆60Updated 8 months ago
- 🖇️ STRIDE vs. ASVS equivalence table☆76Updated 11 months ago
- Scanner to identify dangling DNS records and subdomain takeovers☆45Updated 8 months ago
- ☆37Updated last year