danielmiessler / athi
ATHI — An AI Threat Modeling Framework for Policymakers
☆51Updated last year
Alternatives and similar repositories for athi
Users that are interested in athi are comparing it to the libraries listed below
Sorting:
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆64Updated 10 months ago
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆58Updated last year
- AI featured threat modeling and security review action☆43Updated 5 months ago
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆76Updated last week
- A project to visualize the software supply chain☆50Updated last year
- Clean accounts over permissions in GCP infra at scale☆71Updated 2 years ago
- A knowledge source about TTPs used to target GenAI-based systems, copilots and agents☆35Updated 2 months ago
- OWASP Foundation Web Respository☆28Updated 8 months ago
- An AI-powered tool for discovering privilege escalation opportunities in AWS IAM configurations.☆110Updated 7 months ago
- Tool for obfuscating and deobfuscating data.☆70Updated last year
- https://breaches.cloud☆39Updated 7 months ago
- ☆41Updated 2 months ago
- ☆15Updated 3 years ago
- ☆23Updated last month
- 🤖 A GitHub action that leverages fabric patterns through an agent-based approach☆26Updated 4 months ago
- LLM Testing Findings Templates☆72Updated last year
- A GitHub workflow to identify employees that have leaked your organization's code☆13Updated last year
- A collection of models for organizing, prioritizing, and understanding cybersecurity and information risk management concepts.☆22Updated 7 months ago
- ☆15Updated last year
- Vulnerable by Design AWS Cloud Development Kit (CDK) Infrastructure☆47Updated last year
- OWASP Foundation Web Respository☆55Updated 2 years ago
- ☆18Updated 3 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆31Updated 3 years ago
- ☆36Updated 4 months ago
- Source code for the Binaries of OWASP WrongSecrets☆11Updated this week
- Collection of mine and others presentations on various topics like application security, python, cloud security, DevSecOps and so on... T…☆38Updated last month
- Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Security Management.☆31Updated 6 months ago
- AI/ML applications have unique security threats. Project GuardRail is a set of security and privacy requirements that AI/ML applications …☆29Updated 4 months ago
- Examples on how to maintain security/compliance as code and to automate SecOps using the JupiterOne platform.☆53Updated last year
- InfoSec OpenAI Examples☆19Updated last year