stfbk / PILLARLinks
An AI-Powered Privacy Threat Modeling tool based on the LINDDUN framework by leveraging Large Language Models.
☆20Updated 2 weeks ago
Alternatives and similar repositories for PILLAR
Users that are interested in PILLAR are comparing it to the libraries listed below
Sorting:
- ☆120Updated last week
- ☆38Updated 7 months ago
- ☆88Updated 4 years ago
- One Conference 2024☆111Updated 10 months ago
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆209Updated this week
- AI featured threat modeling and security review action☆45Updated 8 months ago
- ☆19Updated 3 years ago
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆78Updated last year
- ☆84Updated 9 months ago
- Stakeholder-Specific Vulnerability Categorization☆158Updated this week
- Segment's Threat Modeling training for our engineers☆245Updated 4 years ago
- Threat Modeling Manifesto☆28Updated last year
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆174Updated 8 months ago
- ☆25Updated last year
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆90Updated 3 months ago
- A hands-on, real-world GRC lab series built for beginners and curious pros alike. No PDFs. No gatekeeping. Just practical labs for unders…☆37Updated this week
- This GitHub page shows the CISO Tradecraft Podcast broken down by Topic☆132Updated last week
- The Security Champion Framework provides both a measuring stick and a roadmap generator for Champion Programs.☆108Updated last year
- A low-cost approach to testing AI chat experiences and security concepts☆34Updated 3 weeks ago
- A comprehensive checklist and guide for organizations looking to implement a robust cybersecurity program☆41Updated last month
- App that simplifies building decision trees to model adverse scenarios☆216Updated last year
- A repository containing OSCAL serializations of the CIS Critical Security Controls☆54Updated 4 months ago
- OWASP Foundation Web Respository☆289Updated this week
- The Elevation of Privilege Threat Modeling Game☆334Updated last year
- ☆27Updated last week
- OWASP Foundation Web Respository☆31Updated 2 years ago
- Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogue…☆70Updated 2 weeks ago
- Documentation on the Cyber Defense Matrix☆24Updated 2 years ago
- A collection of awesome security controls mapping for solutions across frameworks.☆56Updated 5 years ago
- An extensive list of resources related to threat modelling. Gotta catch ’em all!☆39Updated 3 weeks ago