stfbk / PILLAR
An AI-Powered Privacy Threat Modeling tool based on the LINDDUN framework by leveraging Large Language Models.
☆16Updated 2 weeks ago
Alternatives and similar repositories for PILLAR:
Users that are interested in PILLAR are comparing it to the libraries listed below
- ☆77Updated 6 months ago
- This repository hosts a persona based privacy threat modeling solution called Models of Applied Privacy or MAP.☆31Updated 5 months ago
- AI featured threat modeling and security review action☆43Updated 5 months ago
- ☆36Updated 3 months ago
- This repository stores content that can be used to design a Rapid Threat Model Prototyping process for a software development group.☆160Updated 2 years ago
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆171Updated 5 months ago
- Cryptography Bill of Materials☆67Updated 2 months ago
- ☆33Updated 3 years ago
- AI/ML applications have unique security threats. Project GuardRail is a set of security and privacy requirements that AI/ML applications …☆28Updated 3 months ago
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆74Updated 11 months ago
- AI featured threat modeling and security review project☆16Updated 5 months ago
- Threat Modeling Manifesto☆28Updated 9 months ago
- Core model including reused documentation☆96Updated last month
- One Conference 2024☆109Updated 6 months ago
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆62Updated 10 months ago
- Software Component Verification Standard (SCVS)☆143Updated 3 weeks ago
- Open Threat Modeling Template☆50Updated 9 months ago
- ☆25Updated last year
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆194Updated this week
- Continuous Audit Metrics☆26Updated 10 months ago
- A compliance analysis tool which enables organizations to more quickly articulate their compliance posture and also generate supporting e…☆40Updated 3 weeks ago
- CALDERA plugin for adversary emulation of AI-enabled systems☆95Updated last year
- Segment's Threat Modeling training for our engineers☆243Updated 3 years ago
- KEV EPSS Data☆23Updated this week
- OWASP Foundation Web Respository☆14Updated 3 years ago
- 🖇️ STRIDE vs. ASVS equivalence table☆76Updated 8 months ago
- StartLeft is an automation tool for generating Threat Models written in the Open Threat Model (OTM) format from a variety of different so…☆50Updated this week
- Dragon-GPT uses Chat-GPT, or local LLM, to execute automatic and AI-powered threat modeling analysis on a given OWASP Threat Dragon diagr…☆35Updated 2 months ago
- The Security Champion Framework provides both a measuring stick and a roadmap generator for Champion Programs.☆107Updated last year
- Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogue…☆59Updated last week