samvas-codes / cspm-gpt
The following is a simple example of how LLMs and langchain agents can simplify asking questions to understand the security posture of a cloud environment.
☆21Updated last year
Alternatives and similar repositories for cspm-gpt:
Users that are interested in cspm-gpt are comparing it to the libraries listed below
- ☆26Updated 8 months ago
- Based on Lightspin proprietary data, research, and our tracking of cloud security trends in the market, our research team has compiled a …☆40Updated 2 years ago
- Kubernetes POC for utilizing write mount to /var/log for getting a root on the host☆94Updated 4 years ago
- Run CodeQL queries at scale using Multi-Repository Variant Analysis (MRVA)☆59Updated 3 weeks ago
- This repository contains a curated list of awesome resources related to AISecOps.☆14Updated 3 years ago
- Intentionally vulnerable Go web app.☆43Updated 2 months ago
- INTERCEPT / Policy as Code Auditing & Compliance☆84Updated 2 months ago
- AutoMSS 是基于AI Agent实现的针对安全事件自动化分析研判的系统,由cloud Totem团队开发,希望有兴趣的朋友可以一起参与进来更新和完善。邮箱联系:automss@cloud-totem.com☆42Updated 9 months ago
- A penetration toolkit for container environment☆77Updated 2 months ago
- awesome resources about cloud native security 🐿☆313Updated last year
- k0otkit is a universal post-penetration technique which could be used in penetrations against Kubernetes clusters.☆286Updated 3 years ago
- ChatCVE is an app using the Langchain SQL Language Tool to give a LLM prompt experience to CVE and SBOM DevSecOps Triage Data☆20Updated 9 months ago
- Resources for CloudNative security research☆32Updated 3 years ago
- 近年来容器安全相关论文收集整理☆16Updated last year
- ☆165Updated 2 years ago
- Post-exploit a compromised etcd, gain persistence and remote shell to nodes.☆74Updated 10 months ago
- 《深入理解DAST动态应用程序安全测试》Dynamic Application Security Testing.☆49Updated 2 years ago
- Trivy's misconfiguration scanning engine☆216Updated 2 months ago
- My AI security testing projects☆41Updated 6 years ago
- ☆182Updated last week
- Vulnerability Scanner for Detecting Publicly Disclosed Vulnerabilities in Application Dependencies☆23Updated 5 years ago
- ☆71Updated 3 years ago
- Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).☆81Updated last year
- Simple source code security audit helper☆50Updated 8 months ago
- A collection of various scripts and automations to simplify Checkmarx SAST and IAST setup and use☆14Updated 6 years ago
- CodeQL database manager☆48Updated 3 weeks ago
- Automated SonarQube☆73Updated 5 years ago
- Information about Kubernetes CVE-2020-8558, including proof of concept exploit.☆42Updated 4 years ago
- Secure Jupyter Notebooks and Experimentation Environment☆72Updated last month
- 《深入理解Semgrep》Finding vulnerabilities with Semgrep.☆47Updated last year