This repository offers a detailed taxonomy of existing AI-driven security solutions tailored for DevSecOps, highlighting the current research challenges and suggesting future directions for the field. It serves as a resource for researchers, developers, and security professionals interested in the intersection of AI and DevSecOps.
☆19Jul 2, 2025Updated 8 months ago
Alternatives and similar repositories for Awesome-AI4DevSecOps
Users that are interested in Awesome-AI4DevSecOps are comparing it to the libraries listed below
Sorting:
- A GitHub Actions Supply Chain CTF / Goat☆26Jan 6, 2026Updated 2 months ago
- VulnerabilityDetectionResearch☆93Mar 22, 2022Updated 3 years ago
- hardware security course from Coursera and University of Maryland☆28Mar 12, 2015Updated 10 years ago
- Release repository for ProcDump-for-Mac☆43Nov 27, 2024Updated last year
- Card Payments Simulation Tool For Indie Devs : Core Card Switch Engine, Fraud Engine, ATM/POS GUI Simulator , Admin Dash (Real-time MSG …☆19Jun 15, 2025Updated 8 months ago
- 《2021医学健康数据分析与挖掘》课程论文 -- 基于BERT的20NewsGroups数据集新闻分类实验☆10Jun 22, 2021Updated 4 years ago
- A very basic app written in Javascript and packaged as a Docker image to be used as a demo when testing clustered deployments in ECS/EKS.☆11Jun 30, 2023Updated 2 years ago
- ☆11Aug 28, 2025Updated 6 months ago
- Tiny library API that we wrote as part of YT video to get deployed on Kubernetes.☆10Oct 2, 2025Updated 5 months ago
- Parse Bluetooth Low Energy peripheral advertising packets☆14Nov 7, 2021Updated 4 years ago
- AWS lambda function for S3 delete and copy data from source S3 to another target S3☆16Oct 16, 2019Updated 6 years ago
- Convert Confluence MIME exports (.doc) to clean Markdown☆34Jan 13, 2026Updated last month
- A fully automated solution to create security-hardened Amazon EKS AMIs that comply with either CIS Level 1 or Level 2 standards.☆62Dec 9, 2025Updated 2 months ago
- Sample of a Malicious baseband signed by Apple☆10May 12, 2022Updated 3 years ago
- A dark retro theme for Zola☆35Dec 29, 2025Updated 2 months ago
- Command line Teensy Loader☆11Sep 21, 2015Updated 10 years ago
- Docker files for Miasm☆17Apr 27, 2018Updated 7 years ago
- ☆11Dec 9, 2025Updated 2 months ago
- Automation of Databricks workflows☆13Nov 9, 2025Updated 3 months ago
- The VulnCheck Github Action☆13Feb 25, 2026Updated last week
- ESP8266 ROM Bootloader utility☆11Oct 18, 2017Updated 8 years ago
- Official Implementation of implicit reference attack☆11Oct 16, 2024Updated last year
- Cloud CA built using AWS CA Terraform Module☆13Updated this week
- ☆11Dec 18, 2020Updated 5 years ago
- Takes a software bill of materials and outputs provenance, and activity data from trustypkg.dev☆10May 19, 2025Updated 9 months ago
- SLSA Proposals☆11Jan 29, 2024Updated 2 years ago
- ☸️🚀🏗️A bit automation with Terraform to provision an EC2 instance (infrastructure as Code) on AWS and using Ansible to install Docker o…☆18Dec 1, 2021Updated 4 years ago
- Instrumented MIPS kernel☆14Sep 1, 2020Updated 5 years ago
- This Repo is under constant update. We will update all the notes while preparing for OSCP. If anyone want to contribute you are most welc…☆11Aug 29, 2019Updated 6 years ago
- Azure Chaos Engineering Solution Accelerator☆11Sep 30, 2024Updated last year
- The kernel for the Wink Hub☆11Oct 29, 2014Updated 11 years ago
- FIRE: Combining Multi-Stage Filtering with Taint Analysis for Scalable Recurring Vulnerability Detection.☆15Sep 27, 2024Updated last year
- My code and notes for "From Day Zero to Zero Day", a book on vulnerability research by Eugene Lim.☆30Nov 10, 2025Updated 3 months ago
- Automatically distribute GitHub Actions workflow across repositories.☆12Updated this week
- An application for retrieving and viewing success metrics from Sonatype Nexus IQ☆17Feb 14, 2025Updated last year
- OAuch is an open-source security best practices and threats analyzer for OAuth 2.0 authorization server implementations☆13Sep 4, 2025Updated 6 months ago
- ☆10May 30, 2020Updated 5 years ago
- PoC code for CVE-2019-14041☆13Apr 15, 2020Updated 5 years ago
- Threat Modeling with ATT&CK defines how to integreate MITRE ATT&CK® into your organization’s existing threat modeling methodology.☆12May 28, 2025Updated 9 months ago