A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects
☆104Oct 13, 2025Updated 4 months ago
Alternatives and similar repositories for ai-security-analyzer
Users that are interested in ai-security-analyzer are comparing it to the libraries listed below
Sorting:
- An experimental project using LLM technology to generate security documentation for Open Source Software (OSS) projects☆34Feb 28, 2025Updated last year
- AI featured threat modeling and security review project☆17Nov 17, 2024Updated last year
- An AI-powered threat modeling tool that leverages OpenAI's GPT models to generate threat models for a given application based on the STRI…☆991Updated this week
- Save toil in security operations with: Detection & Intelligence Analysis for New Alerts (D.I.A.N.A. )☆224Sep 4, 2024Updated last year
- AI featured threat modeling and security review action☆46Nov 17, 2024Updated last year
- ☆30Jan 13, 2026Updated last month
- Gram is Klarna's own threat model diagramming tool☆331Jan 26, 2026Updated last month
- Open source templates you can use to bootstrap your security programs☆890Dec 28, 2025Updated 2 months ago
- ☆17Feb 3, 2026Updated last month
- Repository for CoSAI Workstream 1, Software Supply Chain Security for AI Systems☆43Sep 29, 2025Updated 5 months ago
- Top 2025 Vulnerabilities You Shouldn’t Accept in a Pentest Report☆14Feb 6, 2025Updated last year
- MultiStep MCP That Returns CVE Information With EPSS Score☆13May 22, 2025Updated 9 months ago
- Threat Modeling with ATT&CK defines how to integreate MITRE ATT&CK® into your organization’s existing threat modeling methodology.☆12May 28, 2025Updated 9 months ago
- ☆10Aug 9, 2024Updated last year
- Repository to archive AWS Documentation for local use☆50Oct 14, 2024Updated last year
- Cloud Commotion intends to cause chaos to simulate security incidents☆146Jun 18, 2024Updated last year
- An index of publicly available and open-source threat detection rulesets.☆130Apr 17, 2025Updated 10 months ago
- A simple threat modeling tool to help humans to reduce time-to-value when threat modeling☆683Updated this week
- Security Blogs - A simple aggregator for security news/blog☆24Jan 19, 2026Updated last month
- ☆10Dec 8, 2022Updated 3 years ago
- ☆31Oct 28, 2024Updated last year
- AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE…☆1,206Dec 29, 2025Updated 2 months ago
- Live validation proxy tool for testing web app vulnerabilities☆832Feb 14, 2026Updated 3 weeks ago
- Scripts for importing threat feeds and CTI articles, blogs, and reports into MISP.☆18Jun 16, 2025Updated 8 months ago
- IP address filter by City☆12Jan 17, 2025Updated last year
- ☆20Apr 10, 2025Updated 10 months ago
- This repository provides examples of Vulnerable and Mitigated code as per CWE Categorization.☆23May 4, 2024Updated last year
- Code Repository for: AIRTBench: Measuring Autonomous AI Red Teaming Capabilities in Language Models☆93Mar 1, 2026Updated last week
- AI-driven Threat modeling-as-a-Code (TaaC-AI)☆160Jun 29, 2025Updated 8 months ago
- Vulnerability impact analyzer that reduces false positives in SCA tools by performing intelligent code analysis. Uses agentic AI with ope…☆64Feb 22, 2025Updated last year
- A basic exemple of the API-Hashing method used by Red Teamers but also by malwares developers in C++☆37Jan 10, 2024Updated 2 years ago
- A PowerShell-based script to analyze network logs from CSV files and detect potential beaconing behavior. Supports VirusTotal integration…☆17May 11, 2025Updated 9 months ago
- A catalog of services that can be publicly exposed within different cloud providers.☆14Aug 30, 2024Updated last year
- Reasoning model integration for pydantic-ai's agent☆14Oct 13, 2025Updated 4 months ago
- A tool for folks who `git clone` first and ask questions later☆66Sep 12, 2025Updated 5 months ago
- Easily scan with multiple yara rules from different sources.☆14Mar 9, 2024Updated last year
- Powershell Based tool for gathering information related to O365 intrusions and potential Breaches☆17Dec 29, 2024Updated last year
- ☆192Apr 16, 2025Updated 10 months ago
- A research project to add some brrrrrr to Burp☆207Feb 16, 2026Updated 2 weeks ago