danielmiessler / athi
ATHI — An AI Threat Modeling Framework for Policymakers
☆50Updated last year
Alternatives and similar repositories for athi:
Users that are interested in athi are comparing it to the libraries listed below
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆61Updated 9 months ago
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆62Updated 2 weeks ago
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆58Updated last year
- Collection of mine and others presentations on various topics like application security, python, cloud security, DevSecOps and so on... T…☆36Updated last week
- Examples on how to maintain security/compliance as code and to automate SecOps using the JupiterOne platform.☆53Updated last year
- A project to visualize the software supply chain☆43Updated last year
- Continuous Audit Metrics☆25Updated 9 months ago
- DEPRECATED: A set of utilities for converting and working with compliance data for viewing in the heimdall applications☆35Updated 3 years ago
- An AI-powered tool for discovering privilege escalation opportunities in AWS IAM configurations.☆105Updated 5 months ago
- Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Security Management.☆30Updated 5 months ago
- Tool for obfuscating and deobfuscating data.☆69Updated last year
- NIST OSCAL SDK and CLI☆18Updated 8 months ago
- Clean accounts over permissions in GCP infra at scale☆71Updated last year
- AI featured threat modeling and security review action☆43Updated 4 months ago
- A collection of models for organizing, prioritizing, and understanding cybersecurity and information risk management concepts.☆22Updated 5 months ago
- Global Security Database Tools☆42Updated last year
- A CLI that scans for sensitive data in source code☆14Updated 2 years ago
- Markdown Version of the DHS/CISA Secure Software Development Self Attestation Form.☆21Updated last year
- ☆36Updated 3 months ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆58Updated 2 months ago
- StartLeft is an automation tool for generating Threat Models written in the Open Threat Model (OTM) format from a variety of different so…☆50Updated last week
- HashiCorp-relevant rules for the Semgrep code analysis tool☆39Updated last year
- Build a CVE library with aggregated CISA, EPSS and CVSS data☆27Updated last year
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆170Updated 4 months ago
- The Open Security Summit is focused on the collaboration between, Developers and Application Security☆45Updated 3 months ago
- A tool for preventing the installation of malicious PyPI and npm packages☆130Updated this week
- 🤖 A GitHub action that leverages fabric patterns through an agent-based approach☆20Updated 2 months ago
- AWS honey token manager☆87Updated 7 months ago
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆73Updated 10 months ago
- Static code analyser for backdoors and malicious code in git repos using OpenAI compatible LLM APIs☆72Updated last year