danielmiessler / athi
ATHI — An AI Threat Modeling Framework for Policymakers
☆45Updated last year
Related projects ⓘ
Alternatives and complementary repositories for athi
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆57Updated last year
- AI featured threat modeling and security review action☆40Updated 5 months ago
- HashiCorp-relevant rules for the Semgrep code analysis tool☆37Updated last year
- Clean accounts over permissions in GCP infra at scale☆71Updated last year
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆55Updated 4 months ago
- Tool for obfuscating and deobfuscating data.☆63Updated 7 months ago
- RedFlag uses AI to identify high-risk code changes. Run it in batch mode for release candidate testing or in CI pipelines to flag PRs and…☆140Updated last week
- An AI-powered tool for discovering privilege escalation opportunities in AWS IAM configurations.☆96Updated last month
- https://breaches.cloud☆36Updated 3 weeks ago
- ☆67Updated 8 months ago
- The Open Security Summit is focused on the collaboration between, Developers and Application Security☆45Updated last week
- Static code analyser for backdoors and malicious code in git repos using OpenAI compatible LLM APIs☆69Updated 8 months ago
- Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Security Management.☆29Updated 3 weeks ago
- Use AI to Scan Your Code from the Command Line for security and code smells. Bring your own keys. Supports OpenAI and Gemini☆149Updated 7 months ago
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆82Updated 9 months ago
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆169Updated 8 months ago
- Markdown Version of the DHS/CISA Secure Software Development Self Attestation Form.☆21Updated last year
- Examples on how to maintain security/compliance as code and to automate SecOps using the JupiterOne platform.☆53Updated 10 months ago
- ☆79Updated this week
- ☆107Updated last month
- A tool to uncover undocumented APIs from the AWS Console.☆80Updated last month
- Build a CVE library with aggregated CISA, EPSS and CVSS data☆27Updated last year
- Secure Jupyter Notebooks and Experimentation Environment☆55Updated 2 weeks ago
- A full insecure kubernetes application for testing security tools☆54Updated last week
- ☆51Updated 8 months ago
- LLM Testing Findings Templates☆65Updated 8 months ago
- ☆109Updated last year
- Template SOC2 Policy Authority - documentation pipeline☆99Updated 4 years ago
- An open-source collection of API key rotation tutorials.☆58Updated 2 months ago
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆62Updated 4 months ago