untamed-theory / vibesecLinks
Security Rules & Workflows for the new wave of AI Development.
☆43Updated 2 months ago
Alternatives and similar repositories for vibesec
Users that are interested in vibesec are comparing it to the libraries listed below
Sorting:
- Threat Designer is a GenerativeAI application designed to automate and streamline the threat modeling process for secure system design.☆153Updated last week
 - Summaries, transcripts, key points, and other useful insights from fwd:cloudsec 2025 talks for those of us who don't have time to watch e…☆82Updated 4 months ago
 - Repository to archive AWS Documentation for local use☆49Updated last year
 - ☆28Updated last month
 - Harness the security superpowers of your cloud asset inventory☆11Updated last year
 - Summaries, transcripts, key points, and other useful insights from AWS re:inforce 2025 talks for those of us who don't have time to watch…☆100Updated 4 months ago
 - Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆58Updated 2 years ago
 - Public repository of all things cloud security.☆45Updated last year
 - A flexible framework for security teams to build and deploy AI-powered workflows that complement their existing security operations.☆134Updated this week
 - A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆97Updated 3 weeks ago
 - This is a sample solution that demonstrates how to use AWS IAM Identity Center with Neptune to visualize and map relationships between id…☆26Updated 2 months ago
 - Google Maps for AWS IAM☆238Updated last week
 - Data perimeter helper is a tool that helps you design and anticipate the impact of your data perimeter controls☆18Updated 7 months ago
 - Cloud Commotion intends to cause chaos to simulate security incidents☆146Updated last year
 - Generates runbooks for GuardDuty findings☆39Updated last year
 - An AI-powered tool for discovering privilege escalation opportunities in AWS IAM configurations.☆116Updated last month
 - Repository to archive GCP Documentation for local use☆16Updated 8 months ago
 - A catalog of services that can be publicly exposed within different cloud providers.☆15Updated last year
 - This Terraform module consists of the configuration for automating the remediation of AWS EC2 vulnerabilities using AWS Inspector finding…☆49Updated 3 months ago
 - A low-cost approach to testing AI chat experiences and security concepts☆38Updated 3 months ago
 - AWS honey token manager☆89Updated last year
 - Adaptive AWS Zero Trust Policy made easy: Auto-generate least-privilege policies based on user activity in real time! Accelerate the adop…☆75Updated last year
 - KYE: Know Your Enemies - Check external access on your AWS account☆126Updated 6 months ago
 - A Model Context Protocol server that connects AI assistants like Claude to AWS security services, allowing them to autonomously query, in…☆76Updated 3 months ago
 - Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Security Management.☆36Updated last year
 - Test & Compare different Kubernetes security offerings on EKS, GKE and AKS☆40Updated last year
 - This solutions facilitates rapid deployment of Prowler, full AWS Organization analysis, and finding processing as part of a security post…☆62Updated 5 months ago
 - ☆55Updated this week
 - ☆44Updated 2 months ago
 - Convert cloudtrail data to MITRE ATT&CK Sightings☆81Updated 3 years ago