danielmiessler / athiLinks
ATHI — An AI Threat Modeling Framework for Policymakers
☆58Updated 2 years ago
Alternatives and similar repositories for athi
Users that are interested in athi are comparing it to the libraries listed below
Sorting:
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆98Updated last month
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆67Updated 5 months ago
- An AI-powered tool for discovering privilege escalation opportunities in AWS IAM configurations.☆117Updated this week
- DEPRECATED: A set of utilities for converting and working with compliance data for viewing in the heimdall applications☆35Updated 3 years ago
- Examples on how to maintain security/compliance as code and to automate SecOps using the JupiterOne platform.☆54Updated this week
- The Secure Coding Framework☆22Updated 5 years ago
- 🤖 A GitHub action that leverages fabric patterns through an agent-based approach☆32Updated 11 months ago
- OWASP Top 10 Infrastructure Security Risks☆43Updated last month
- A fun POC that is built to understand AI security agents.☆34Updated last month
- Secure Jupyter Notebooks and Experimentation Environment☆84Updated 10 months ago
- Tool for obfuscating and deobfuscating data.☆75Updated last year
- AI Security Shared Responsibility Model☆85Updated 2 months ago
- Vulnerability impact analyzer that reduces false positives in SCA tools by performing intelligent code analysis. Uses agentic AI with ope…☆61Updated 9 months ago
- Template SOC2 Policy Authority - documentation pipeline☆136Updated 5 years ago
- The Open Security Summit is focused on the collaboration between, Developers and Application Security☆45Updated 5 months ago
- RedFlag uses AI to identify high-risk code changes. Run it in batch mode for release candidate testing or in CI pipelines to flag PRs and…☆155Updated last year
- MetaHub is an automated contextual security findings enrichment and impact evaluation tool for vulnerability management.☆177Updated 2 weeks ago
- Clean accounts over permissions in GCP infra at scale☆71Updated 2 years ago
- A collection of models for organizing, prioritizing, and understanding cybersecurity and information risk management concepts.☆25Updated last year
- ☆131Updated last month
- A project to visualize the software supply chain☆55Updated 2 years ago
- Use AI to Scan Your Code from the Command Line for security and code smells. Bring your own keys. Supports OpenAI and Gemini☆177Updated 7 months ago
- ☆29Updated 3 weeks ago
- ☆38Updated 11 months ago
- A CLI that scans for sensitive data in source code☆14Updated 2 years ago
- This python app generates NIST 800 53 control implementation for each control and generate the CSV file.☆53Updated last year
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆59Updated 2 years ago
- A meta-database collecting resources that compile lists of breaches☆20Updated last month
- HashiCorp-relevant rules for the Semgrep code analysis tool☆41Updated 2 years ago
- ☆55Updated 7 months ago