stfbk / PILLAR
An AI-Powered Privacy Threat Modeling tool based on the LINDDUN framework by leveraging Large Language Models.
☆17Updated last week
Alternatives and similar repositories for PILLAR
Users that are interested in PILLAR are comparing it to the libraries listed below
Sorting:
- Stakeholder-Specific Vulnerability Categorization☆148Updated this week
- ☆77Updated 6 months ago
- Threat Modeling Manifesto☆28Updated 9 months ago
- This repository hosts a persona based privacy threat modeling solution called Models of Applied Privacy or MAP.☆31Updated 6 months ago
- StartLeft is an automation tool for generating Threat Models written in the Open Threat Model (OTM) format from a variety of different so…☆50Updated this week
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆75Updated last year
- Continuous Audit Metrics☆26Updated 11 months ago
- ☆36Updated 4 months ago
- A repository containing OSCAL serializations of the CIS Critical Security Controls☆50Updated last month
- ☆16Updated 2 years ago
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆172Updated 5 months ago
- Scripts to import OSCAL example content into the Neo4J graph database☆28Updated 2 years ago
- AI featured threat modeling and security review project☆16Updated 6 months ago
- AI featured threat modeling and security review action☆43Updated 6 months ago
- A low-cost approach to testing LLM chat experiences and security☆18Updated this week
- A collection of models for organizing, prioritizing, and understanding cybersecurity and information risk management concepts.☆22Updated 7 months ago
- OWASP Foundation Web Respository☆16Updated last year
- ☆25Updated last year
- This repository contains resources to support organizations’ use of the Privacy Framework. Resources include crosswalks, Profiles, guidel…☆53Updated 9 months ago
- ☆25Updated last month
- A comprehensive checklist and guide for organizations looking to implement a robust cybersecurity program☆27Updated this week
- OWASP Foundation Web Respository☆31Updated 2 years ago
- Examples on how to maintain security/compliance as code and to automate SecOps using the JupiterOne platform.☆53Updated last year
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆194Updated this week
- ☆41Updated 2 months ago
- The Security Champion Framework provides both a measuring stick and a roadmap generator for Champion Programs.☆108Updated last year
- Exploit Prediction Scoring System (EPSS)☆25Updated 2 years ago
- ☆21Updated last month
- Repository for on-going work as part of the AIBOM Tiger Team effort.☆21Updated 3 weeks ago
- Documentation on the Cyber Defense Matrix☆24Updated 2 years ago