stfbk / PILLARLinks
An AI-Powered Privacy Threat Modeling tool based on the LINDDUN framework by leveraging Large Language Models.
☆23Updated 5 months ago
Alternatives and similar repositories for PILLAR
Users that are interested in PILLAR are comparing it to the libraries listed below
Sorting:
- One Conference 2024☆111Updated last year
- AI Security Shared Responsibility Model☆87Updated 3 months ago
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆214Updated this week
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆99Updated 2 months ago
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆177Updated 3 weeks ago
- Code that implements Factor Analysis of Information Risk (FAIR) in combination with MITRE ATT&CK using Markov Chain Monte Carlo (via PyMC…☆44Updated last month
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆82Updated last year
- ☆89Updated 3 months ago
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆59Updated 2 years ago
- ☆38Updated last year
- A comprehensive checklist and guide for organizations looking to implement a robust cybersecurity program☆46Updated 3 weeks ago
- AI featured threat modeling and security review action☆45Updated last year
- ☆87Updated 4 years ago
- ☆16Updated 2 years ago
- Stakeholder-Specific Vulnerability Categorization☆168Updated this week
- An experimental project using LLM technology to generate security documentation for Open Source Software (OSS) projects☆34Updated 10 months ago
- ☆134Updated this week
- OWASP Foundation web repository☆52Updated 2 weeks ago
- The Elevation of Privilege Threat Modeling Game☆337Updated last year
- StartLeft is an automation tool for generating Threat Models written in the Open Threat Model (OTM) format from a variety of different so…☆52Updated last month
- An extensive list of resources related to threat modelling. Gotta catch ’em all!☆40Updated last month
- Save toil in security operations with: Detection & Intelligence Analysis for New Alerts (D.I.A.N.A. )☆223Updated last year
- Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogue…☆85Updated 2 weeks ago
- Cloud Commotion intends to cause chaos to simulate security incidents☆146Updated last year
- Segment's Threat Modeling training for our engineers☆244Updated 4 years ago
- Secure Coding Rules for Claude Code with a particular emphasis on AIML projects☆53Updated 2 weeks ago
- 🖇️ equivalence table between OWASP ASVS standard and STRIDE threat modeling methodology.☆75Updated last year
- A Secure Controls Framework (SCF) Power BI App☆26Updated last year
- This is a companion to the Security Engineer Questions☆204Updated 2 years ago
- A hands-on, real-world GRC lab series built for beginners and curious pros alike. No PDFs. No gatekeeping. Just practical labs for unders…☆88Updated 2 months ago