fraim-dev / fraimLinks
A flexible framework for security teams to build and deploy AI-powered workflows that complement their existing security operations.
☆110Updated this week
Alternatives and similar repositories for fraim
Users that are interested in fraim are comparing it to the libraries listed below
Sorting:
- Threat Designer is a GenerativeAI application designed to automate and streamline the threat modeling process for secure system design.☆136Updated this week
- Baseline rules files to improve the security of AI-generated code (Claude, Cursor, Copilot + more)☆142Updated 2 months ago
- SecureMCP is a security auditing tool designed to detect vulnerabilities and misconfigurations in applications using the [Model Context P…☆120Updated 2 months ago
- A comprehensive security scanner for Model Context Protocol (MCP) servers that detects vulnerabilities and security issues in your MCP se…☆85Updated this week
- Cloud Commotion intends to cause chaos to simulate security incidents☆145Updated last year
- A Model Context Protocol server that connects AI assistants like Claude to AWS security services, allowing them to autonomously query, in…☆74Updated last month
- An IAM Simulator that outputs detailed explains of how a request was evaluated.☆93Updated this week
- A full insecure kubernetes application for testing security tools☆89Updated 4 months ago
- RedFlag uses AI to identify high-risk code changes. Run it in batch mode for release candidate testing or in CI pipelines to flag PRs and…☆152Updated 9 months ago
- AWS honey token manager☆87Updated last year
- TODO: Funny pun about visibility☆227Updated this week
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆90Updated 3 months ago
- ☆72Updated last month
- A tool for preventing the installation of malicious npm and PyPI packages☆158Updated last week
- A tool to uncover undocumented APIs from the AWS Console.☆113Updated 4 months ago
- cloudgrep is grep for cloud storage☆326Updated 6 months ago
- ☆49Updated 2 years ago
- Generate datasets of cloud audit logs for common attacks☆218Updated last year
- KYE: Know Your Enemies - Check external access on your AWS account☆124Updated 4 months ago
- This is a sample solution that demonstrates how to use AWS IAM Identity Center with Neptune to visualize and map relationships between id…☆26Updated 3 weeks ago
- ☆50Updated 10 months ago
- A multi-vault secret injection tool for safely injecting secrets into app environment☆128Updated 2 weeks ago
- Open-source best practices for protecting a secure, sensible cloud platform☆126Updated 10 months ago
- This Terraform module consists of the configuration for automating the remediation of AWS EC2 vulnerabilities using AWS Inspector finding…☆49Updated last month
- ☆333Updated last week
- Simple plug-and-play Github Action to block unauthorized outbound traffic (egress) in your Github workflows☆110Updated this week
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆143Updated 7 months ago
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆58Updated last year
- MCP security wrapper☆162Updated last week
- A Software as a Service (SaaS) log collection framework.☆177Updated last week