danielmiessler / athiLinks
ATHI — An AI Threat Modeling Framework for Policymakers
☆52Updated last year
Alternatives and similar repositories for athi
Users that are interested in athi are comparing it to the libraries listed below
Sorting:
- Tool for obfuscating and deobfuscating data.☆72Updated last year
- Clean accounts over permissions in GCP infra at scale☆71Updated 2 years ago
- DEPRECATED: A set of utilities for converting and working with compliance data for viewing in the heimdall applications☆35Updated 3 years ago
- Examples on how to maintain security/compliance as code and to automate SecOps using the JupiterOne platform.☆54Updated last year
- A project to visualize the software supply chain☆51Updated last year
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆58Updated last year
- AI/ML applications have unique security threats. Project GuardRail is a set of security and privacy requirements that AI/ML applications …☆29Updated 6 months ago
- An AI-powered tool for discovering privilege escalation opportunities in AWS IAM configurations.☆113Updated this week
- A security tool designed to help review merged code changes to open source maintained repositories via LLM assisted review to safeguard a…☆30Updated 8 months ago
- EZGHSA is a command-line tool for summarizing and filtering vulnerability alerts on Github repositories.☆35Updated 6 months ago
- ☆73Updated 3 months ago
- A collection of models for organizing, prioritizing, and understanding cybersecurity and information risk management concepts.☆22Updated 9 months ago
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆65Updated 3 weeks ago
- A fun POC that is built to understand AI security agents.☆31Updated 6 months ago
- ☆16Updated 3 years ago
- RedFlag uses AI to identify high-risk code changes. Run it in batch mode for release candidate testing or in CI pipelines to flag PRs and…☆149Updated 7 months ago
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆89Updated 2 months ago
- Template SOC2 Policy Authority - documentation pipeline☆114Updated 4 years ago
- Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Security Management.☆31Updated 9 months ago
- 🤖 A GitHub action that leverages fabric patterns through an agent-based approach☆28Updated 6 months ago
- This python app generates NIST 800 53 control implementation for each control and generate the CSV file.☆48Updated last year
- ☆10Updated 3 years ago
- HashiCorp-relevant rules for the Semgrep code analysis tool☆41Updated last year
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆71Updated last year
- ☆19Updated 3 years ago
- GitHub action to run Threagile, the agile threat modeling toolkit, on a repo's threagile.yaml file☆13Updated last year
- Knowledge Report Alert & Normalization Generator☆27Updated last year
- Golang installer for DefectDojo☆28Updated 5 months ago
- DefectDojo Community Content☆18Updated last month
- Markdown Version of the DHS/CISA Secure Software Development Self Attestation Form.☆21Updated 2 years ago