stfbk / PILLAR
An AI-Powered Privacy Threat Modeling tool based on the LINDDUN framework by leveraging Large Language Models.
☆16Updated 2 months ago
Alternatives and similar repositories for PILLAR:
Users that are interested in PILLAR are comparing it to the libraries listed below
- Threat Modeling Manifesto☆28Updated 8 months ago
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆170Updated 4 months ago
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆73Updated 10 months ago
- ☆36Updated 3 months ago
- StartLeft is an automation tool for generating Threat Models written in the Open Threat Model (OTM) format from a variety of different so…☆50Updated last week
- Cryptography Bill of Materials☆65Updated last month
- Curated list of Open Source project focused on LLM security☆37Updated 4 months ago
- ☆16Updated last year
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆187Updated this week
- AI featured threat modeling and security review project☆16Updated 4 months ago
- ☆76Updated 5 months ago
- This repository hosts a persona based privacy threat modeling solution called Models of Applied Privacy or MAP.☆30Updated 4 months ago
- OWASP Foundation Web Respository☆28Updated 7 months ago
- A compilation of Software Supply Chain Security resources including initiatives, standards, regulations, organizations, vendors, tooling,…☆132Updated last year
- Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogue…☆56Updated 3 weeks ago
- AI featured threat modeling and security review action☆43Updated 4 months ago
- A simple open source command line tool to support common operations over OSCAL content.☆46Updated 9 months ago
- KEV EPSS Data☆22Updated this week
- Privacy Engineering Collaboration Space☆258Updated 10 months ago
- The Security Champion Framework provides both a measuring stick and a roadmap generator for Champion Programs.☆107Updated last year
- A comprehensive, systematic and actionable way to understand attacker behaviors and techniques with respect to the software supply chain☆91Updated last month
- Repository for on-going work as part of the AIBOM Tiger Team effort.☆19Updated 6 months ago
- ☆98Updated 3 weeks ago
- A repository containing OSCAL serializations of the CIS Critical Security Controls☆48Updated last week
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆58Updated last year
- One Conference 2024☆108Updated 5 months ago
- Security Control Knowledge Graph☆28Updated 11 months ago
- Software Component Verification Standard (SCVS)☆142Updated 11 months ago
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆61Updated 9 months ago
- ☆18Updated 3 years ago