samvas-codes / cspm-gpt
The following is a simple example of how LLMs and langchain agents can simplify asking questions to understand the security posture of a cloud environment.
☆22Updated last year
Alternatives and similar repositories for cspm-gpt
Users that are interested in cspm-gpt are comparing it to the libraries listed below
Sorting:
- Based on Lightspin proprietary data, research, and our tracking of cloud security trends in the market, our research team has compiled a …☆40Updated 2 years ago
- ☆26Updated 2 weeks ago
- All-in-one security testing toolbox that brings together popular open source tools through a single MCP interface. Connected to an AI age…☆78Updated 3 weeks ago
- ChatCVE is an app using the Langchain SQL Language Tool to give a LLM prompt experience to CVE and SBOM DevSecOps Triage Data☆21Updated 10 months ago
- Intentionally vulnerable Go web app.☆43Updated 3 months ago
- This repository contains a curated list of awesome resources related to AISecOps.☆14Updated 3 years ago
- Secure Jupyter Notebooks and Experimentation Environment☆74Updated 3 months ago
- Kubernetes POC for utilizing write mount to /var/log for getting a root on the host☆96Updated 4 years ago
- CloudPathSniffer is an open-source, easy to use and extensible Cloud Anomaly Detection platform designed to help security teams to find h…☆13Updated last year
- awesome resources about cloud native security 🐿☆317Updated last year
- Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).☆81Updated last year
- Post-exploit a compromised etcd, gain persistence and remote shell to nodes.☆75Updated last year
- MCP for Security: A collection of Model Context Protocol servers for popular security tools like SQLMap, FFUF, NMAP, Masscan and more. In…☆102Updated this week
- Konstellation is a configuration-driven CLI tool to enumerate cloud resources and store the data into Neo4j.☆21Updated last year
- Executes commands in a container on a kubelet endpoint that allows anonymous authentication (default)☆112Updated 6 years ago
- Curating Falco rules with MITRE ATT&CK Matrix☆79Updated last year
- INTERCEPT / Policy as Code Auditing & Compliance☆84Updated 3 months ago
- Open-Source Vulnerability Intelligence Center - Unified source of vulnerability, exploit and threat Intelligence feeds