xvnpw / ai-threat-modeling
AI featured threat modeling and security review project
☆12Updated this week
Related projects ⓘ
Alternatives and complementary repositories for ai-threat-modeling
- AI featured threat modeling and security review action☆40Updated this week
- ☆37Updated 7 months ago
- LLM Testing Findings Templates☆65Updated 9 months ago
- InfoSec OpenAI Examples☆19Updated 11 months ago
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆61Updated this week
- ☆17Updated 3 weeks ago
- Threat Modeling Manifesto☆27Updated 4 months ago
- 🖇️ STRIDE vs. ASVS equivalence table☆75Updated 2 months ago
- ☆14Updated last year
- A PoC to Simulate Ransomware Attack on AWS Environment☆27Updated last month
- The Measure, Maximize, and Mature Threat-Informed Defense (M3TID) project defines what Threat-Informed Defense (TID) is and the key activ…☆12Updated 7 months ago
- An LLM and OCR based Indicator of Compromise Extraction Tool☆31Updated 7 months ago
- ☆74Updated this week
- AWS Incident Response Kit (AIRK) - AWS Incident Response☆21Updated 4 years ago
- Maturity Model Collaborative project☆13Updated last year
- Convert cloudtrail data to MITRE ATT&CK Sightings☆79Updated 2 years ago
- ☆18Updated 2 years ago
- OWASP Foundation Web Respository☆27Updated last year
- Automate vulnerability triage which prioritizes remediation over discovery☆14Updated this week
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆67Updated 6 months ago
- Updated incident response generator for training classes☆41Updated 3 years ago
- Blogpost series showcasing interesting cloud - web app security bugs☆46Updated last year
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆27Updated 2 years ago
- Semgrep rules corresponding to the OWASP ASVS standard☆27Updated 4 years ago
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆39Updated 11 months ago
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆55Updated 4 months ago
- Damn Vulnerable SCA Application☆15Updated last month
- ☆33Updated last week
- Build a CVE library with aggregated CISA, EPSS and CVSS data☆27Updated last year
- Demonstrates how a malicious dependency could negatively impact the build output.☆23Updated last year