danielmiessler / athiLinks
ATHI — An AI Threat Modeling Framework for Policymakers
☆56Updated 2 years ago
Alternatives and similar repositories for athi
Users that are interested in athi are comparing it to the libraries listed below
Sorting:
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆94Updated 2 weeks ago
- 🤖 A GitHub action that leverages fabric patterns through an agent-based approach☆32Updated 9 months ago
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆67Updated 4 months ago
- RedFlag uses AI to identify high-risk code changes. Run it in batch mode for release candidate testing or in CI pipelines to flag PRs and…☆153Updated 11 months ago
- The Open Security Summit is focused on the collaboration between, Developers and Application Security☆45Updated 3 months ago
- An AI-powered tool for discovering privilege escalation opportunities in AWS IAM configurations.☆116Updated last month
- ☆38Updated 10 months ago
- AI Security Shared Responsibility Model☆81Updated last month
- A project to visualize the software supply chain☆53Updated 2 years ago
- a hackbot proof-of-concept☆40Updated last year
- A fun POC that is built to understand AI security agents.☆33Updated 10 months ago
- ☆123Updated last week
- Tool for obfuscating and deobfuscating data.☆74Updated last year
- HashiCorp-relevant rules for the Semgrep code analysis tool☆42Updated 2 years ago
- Static code analyser for backdoors and malicious code in git repos using OpenAI compatible LLM APIs☆73Updated last year
- OWASP Top 10 Infrastructure Security Risks☆43Updated last week
- InfoSec OpenAI Examples☆19Updated last year
- AI featured threat modeling and security review action☆44Updated 11 months ago
- SecureMCP is a security auditing tool designed to detect vulnerabilities and misconfigurations in applications using the [Model Context P…☆133Updated 4 months ago
- Clean accounts over permissions in GCP infra at scale☆71Updated 2 years ago
- LLM Testing Findings Templates☆74Updated last year
- Secure Jupyter Notebooks and Experimentation Environment☆84Updated 8 months ago
- Template SOC2 Policy Authority - documentation pipeline☆128Updated 5 years ago
- A collection of models for organizing, prioritizing, and understanding cybersecurity and information risk management concepts.☆24Updated last year
- An experimental project using LLM technology to generate security documentation for Open Source Software (OSS) projects☆34Updated 8 months ago
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆58Updated 2 years ago
- A security tool designed to help review merged code changes to open source maintained repositories via LLM assisted review to safeguard a…☆31Updated last year
- Data about all known supply-chain attacks through history☆60Updated 5 months ago
- A comprehensive checklist and guide for organizations looking to implement a robust cybersecurity program☆43Updated 3 weeks ago
- A meta-database collecting resources that compile lists of breaches☆21Updated this week