samvas-codes / cspm-gptLinks
The following is a simple example of how LLMs and langchain agents can simplify asking questions to understand the security posture of a cloud environment.
☆23Updated last year
Alternatives and similar repositories for cspm-gpt
Users that are interested in cspm-gpt are comparing it to the libraries listed below
Sorting:
- ☆35Updated 3 weeks ago
- Based on Lightspin proprietary data, research, and our tracking of cloud security trends in the market, our research team has compiled a …☆40Updated 2 years ago
- This repository contains a curated list of awesome resources related to AISecOps.☆14Updated 3 years ago
- All-in-one security testing toolbox that brings together popular open source tools through a single MCP interface. Connected to an AI age…☆106Updated last week
- CloudRec is an open source multi-cloud security posture management (CSPM) platform designed to help organizations improve the security of…☆140Updated last week
- Open-Source Vulnerability Intelligence Center - Unified source of vulnerability, exploit and threat Intelligence feeds☆134Updated this week
- Secure Jupyter Notebooks and Experimentation Environment☆76Updated 4 months ago
- ChatCVE is an app using the Langchain SQL Language Tool to give a LLM prompt experience to CVE and SBOM DevSecOps Triage Data☆21Updated last year
- A Model Context Protocol (MCP) server for querying the VirusTotal API.☆62Updated 3 months ago
- Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).☆81Updated last year
- Chat4GPT Experiments for Security☆11Updated 2 years ago
- Kubernetes Pwnage for all☆57Updated 4 years ago
- MCP server for querying the Shodan API☆60Updated 3 months ago
- A walkthrough of security controls for a serverless architecture via a demo application☆11Updated 3 years ago
- Executes commands in a container on a kubelet endpoint that allows anonymous authentication (default)☆113Updated 6 years ago
- GPT-3 use cases for Cybersecurity☆53Updated last year
- INTERCEPT / Policy as Code Auditing & Compliance☆84Updated last month
- Post-exploit a compromised etcd, gain persistence and remote shell to nodes.☆80Updated last year
- GPT AiCSA(Code security audit),SAST(Static Application Security Testing,静态应用程序安全测试),JAR security analysis, static vulnerability and vulne…☆60Updated last year
- ☆13Updated 2 months ago
- Kubernetes POC for utilizing write mount to /var/log for getting a root on the host☆96Updated 4 years ago
- ☆43Updated 2 years ago
- This is The most comprehensive prompt hacking course available, which record our progress on a prompt engineering and prompt hacking cour…☆84Updated 2 months ago
- k0otkit is a universal post-penetration technique which could be used in penetrations against Kubernetes clusters.☆291Updated 3 years ago
- Build production ready apps for GPT using Node.js & TypeScript☆44Updated 2 years ago
- Action to retrofit a CodeQL bundle with additional queries, libraries, and customizations☆26Updated last year
- A collection of various scripts and automations to simplify Checkmarx SAST and IAST setup and use☆14Updated 6 years ago
- awesome resources about cloud native security 🐿☆321Updated last year
- ☆30Updated 2 years ago
- Cybersecurity of Machine Learning and Artificial Intelligence☆73Updated 3 years ago