stfbk / PILLARLinks
An AI-Powered Privacy Threat Modeling tool based on the LINDDUN framework by leveraging Large Language Models.
☆23Updated 6 months ago
Alternatives and similar repositories for PILLAR
Users that are interested in PILLAR are comparing it to the libraries listed below
Sorting:
- AI Security Shared Responsibility Model☆88Updated 4 months ago
- Code that implements Factor Analysis of Information Risk (FAIR) in combination with MITRE ATT&CK using Markov Chain Monte Carlo (via PyMC…☆44Updated last month
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆215Updated last week
- ☆16Updated 2 years ago
- An extensive list of resources related to threat modelling. Gotta catch ’em all!☆40Updated last month
- One Conference 2024☆111Updated last year
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆83Updated last year
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆179Updated last month
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆101Updated 3 months ago
- ☆38Updated last year
- ☆87Updated 4 years ago
- AI featured threat modeling and security review project☆17Updated last year
- AI featured threat modeling and security review action☆45Updated last year
- ☆49Updated last month
- ☆89Updated 4 months ago
- This repository stores content that can be used to design a Rapid Threat Model Prototyping process for a software development group.☆164Updated 2 years ago
- Threat Modeling Manifesto☆30Updated last year
- OWASP Foundation web repository☆51Updated last month
- Stakeholder-Specific Vulnerability Categorization☆168Updated this week
- The Security Champion Framework provides both a measuring stick and a roadmap generator for Champion Programs.☆110Updated 2 years ago
- A low-cost approach to testing AI chat experiences and security concepts☆40Updated 6 months ago
- The Elevation of Privilege Threat Modeling Game☆338Updated last year
- KEV EPSS Data☆31Updated this week
- 🖇️ equivalence table between OWASP ASVS standard and STRIDE threat modeling methodology.☆76Updated last year
- A hands-on, real-world GRC lab series built for beginners and curious pros alike. No PDFs. No gatekeeping. Just practical labs for unders…☆89Updated 2 months ago
- An experimental project using LLM technology to generate security documentation for Open Source Software (OSS) projects☆34Updated 11 months ago
- A comprehensive checklist and guide for organizations looking to implement a robust cybersecurity program☆46Updated last month
- Segment's Threat Modeling training for our engineers☆244Updated 4 years ago
- ☆20Updated 4 years ago
- This GitHub page shows the CISO Tradecraft Podcast broken down by Topic☆143Updated 3 weeks ago