danielmiessler / athi
ATHI — An AI Threat Modeling Framework for Policymakers
☆47Updated last year
Alternatives and similar repositories for athi:
Users that are interested in athi are comparing it to the libraries listed below
- AI featured threat modeling and security review action☆42Updated 2 months ago
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆59Updated 6 months ago
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆59Updated last year
- https://breaches.cloud☆36Updated 3 months ago
- Examples on how to maintain security/compliance as code and to automate SecOps using the JupiterOne platform.☆53Updated last year
- An AI-powered tool for discovering privilege escalation opportunities in AWS IAM configurations.☆105Updated 3 months ago
- A self assessment tool to help understand your level in the SANS Vulnerability Management Maturity Model (VMMM).☆20Updated last year
- 🖇️ STRIDE vs. ASVS equivalence table☆75Updated 4 months ago
- Collection of mine and others presentations on various topics like application security, python, cloud security, DevSecOps and so on... T…☆35Updated 3 weeks ago
- Knowledge Report Alert & Normalization Generator☆27Updated 9 months ago
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆170Updated last month
- Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Security Management.☆30Updated 3 months ago
- Clean accounts over permissions in GCP infra at scale☆71Updated last year
- Tool for obfuscating and deobfuscating data.☆67Updated 9 months ago
- OWASP Foundation Web Respository☆28Updated 2 years ago
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆64Updated 6 months ago
- ☆90Updated last month
- a hackbot proof-of-concept☆37Updated 10 months ago
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆88Updated last year
- A CLI that scans for sensitive data in source code☆13Updated last year
- DEPRECATED: A set of utilities for converting and working with compliance data for viewing in the heimdall applications☆35Updated 2 years ago
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆70Updated 8 months ago
- ☆38Updated 9 months ago
- This is a RSS feed collection for all the InfoSec Content Creators☆30Updated last year
- A collection of models for organizing, prioritizing, and understanding cybersecurity and information risk management concepts.☆20Updated 3 months ago
- Simple Workspace Attack Tool (SWAT) is a tool for simulating malicious behavior against Google Workspace in reference to the MITRE ATT&CK…☆164Updated 3 months ago
- Global Security Database Tools☆42Updated last year
- Template SOC2 Policy Authority - documentation pipeline☆106Updated 4 years ago
- Global Security Database Project☆28Updated last year
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆63Updated this week