xvnpw / ai-threat-modelingView external linksLinks
AI featured threat modeling and security review project
☆17Nov 17, 2024Updated last year
Alternatives and similar repositories for ai-threat-modeling
Users that are interested in ai-threat-modeling are comparing it to the libraries listed below
Sorting:
- AI featured threat modeling and security review action☆45Nov 17, 2024Updated last year
- ☆18Nov 6, 2016Updated 9 years ago
- An experimental project using LLM technology to generate security documentation for Open Source Software (OSS) projects☆34Feb 28, 2025Updated 11 months ago
- Dragon-GPT uses Chat-GPT, or local LLM, to execute automatic and AI-powered threat modeling analysis on a given OWASP Threat Dragon diagr…☆41Jun 20, 2025Updated 7 months ago
- A curated list of awesome 🏧 hacking resources.☆14Dec 4, 2025Updated 2 months ago
- Repository for Endpoint Security Testing☆35Jul 26, 2018Updated 7 years ago
- OWASP Foundation web repository☆15Oct 11, 2025Updated 4 months ago
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆103Oct 13, 2025Updated 4 months ago
- Secure access cloud terraform provider☆13Feb 8, 2026Updated last week
- A repo of fake committed secrets to test tools that find committed secrets ([dont submit for BB :-) ]☆10Mar 22, 2018Updated 7 years ago
- A curated list of GPT agents for cybersecurity☆12Oct 2, 2024Updated last year
- Training Language Model Agents to Find Vulnerabilities with CTF-Dojo☆32Jan 10, 2026Updated last month
- ☆11Feb 21, 2016Updated 9 years ago
- Custom security ruleset for the popular Java static analysis tool PMD.☆61Nov 18, 2015Updated 10 years ago
- Read and write Mifare1K tags in Javascript☆13Sep 21, 2017Updated 8 years ago
- This application contains intentional security vulnerabilities and should never be deployed in production environments or exposed to the …☆16Apr 25, 2025Updated 9 months ago
- ☆15Nov 15, 2023Updated 2 years ago
- The behavioural indexer for Ethereum.☆13Jun 13, 2024Updated last year
- SpiderFoot automates OSINT collection so that you can focus on analysis.☆11Apr 20, 2023Updated 2 years ago
- Burp Suite Pro extension☆11May 26, 2017Updated 8 years ago
- toolings for pentester to makes their life easier☆11Feb 25, 2023Updated 2 years ago
- BASH + VIM = Cryptolocker☆11Jul 31, 2018Updated 7 years ago
- ☆11Dec 2, 2025Updated 2 months ago
- Outputs vs. outcomes: what's the different and why does it matter?☆16Apr 14, 2025Updated 10 months ago
- Pragmatic Network Security for Cloud and Hybrid Networks☆10Nov 24, 2015Updated 10 years ago
- Search bing with python☆12Sep 25, 2014Updated 11 years ago
- An python script that use apkleaks to scan the android application over web☆11Jun 2, 2022Updated 3 years ago
- Security Scanning Samples with cnspec, cnquery, and Mondoo Platform☆16Feb 4, 2026Updated last week
- ☆10Jun 30, 2016Updated 9 years ago
- This lab is for **EDUCATIONAL PURPOSES ONLY**. Use it responsibly and only on systems you own or have explicit permission to test. Do not…☆17Jan 8, 2026Updated last month
- Cheat sheets☆10Jul 4, 2016Updated 9 years ago
- Collection of Helm charts that developed by the BeeInventor.☆10Feb 20, 2025Updated 11 months ago
- Top 2025 Vulnerabilities You Shouldn’t Accept in a Pentest Report☆14Feb 6, 2025Updated last year
- Infrastructure-as-code for a serverless knowledge base using Amazon Bedrock, Aurora PostgreSQL (with pgvector), Lambda, and S3. This setu…☆19Mar 23, 2025Updated 10 months ago
- ☆13Aug 10, 2022Updated 3 years ago
- Consolidated demo and source links from Bryant Zadegan and Ryan Lester's Black Hat / DEF CON talk "Abusing Bleeding Edge Web Standards fo…☆11Aug 19, 2017Updated 8 years ago
- Gitlab CI/CD Templates for build,test,deploy to your infra☆12Aug 15, 2024Updated last year
- ☆10Jul 6, 2016Updated 9 years ago
- Musings from the brainpan.☆10Jan 8, 2019Updated 7 years ago