xvnpw / ai-threat-modeling
AI featured threat modeling and security review project
☆12Updated 7 months ago
Related projects ⓘ
Alternatives and complementary repositories for ai-threat-modeling
- AI featured threat modeling and security review action☆40Updated 5 months ago
- ☆36Updated 6 months ago
- InfoSec OpenAI Examples☆19Updated 11 months ago
- LLM Testing Findings Templates☆65Updated 8 months ago
- A PoC to Simulate Ransomware Attack on AWS Environment☆26Updated 3 weeks ago
- Threat Modeling Manifesto☆27Updated 3 months ago
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆61Updated this week
- Demonstrates how a malicious dependency could negatively impact the build output.☆23Updated last year
- 🖇️ STRIDE vs. ASVS equivalence table☆75Updated 2 months ago
- An LLM and OCR based Indicator of Compromise Extraction Tool☆30Updated 7 months ago
- ☆14Updated 2 weeks ago
- This tool analyzes a given Gitlab repository and searches for dangling or force-pushed commits containing potential secret or interesting…☆39Updated 2 months ago
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆39Updated 11 months ago
- GCP GOAT is the vulnerable application for learn the GCP Security☆62Updated last year
- Semgrep rules corresponding to the OWASP ASVS standard☆27Updated 4 years ago
- ☆36Updated 3 years ago
- ☆18Updated 2 years ago
- ☆30Updated 2 years ago
- pocket guide for core detection engineering concepts☆27Updated last year
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆67Updated 6 months ago
- Collect chrome extensions from various devices and find out if they are malicious☆22Updated 2 months ago
- Systematic Universal Security Testing Orchestration☆37Updated 2 years ago
- ☆66Updated 5 months ago
- Blogpost series showcasing interesting cloud - web app security bugs☆46Updated last year
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆55Updated 4 months ago
- ☆61Updated last year
- ☆14Updated last year
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆27Updated 2 years ago
- The Event Maturity Matrix (EMM) is a comprehensive framework that provides clarity regarding the capabilities and nuances of SaaS audit l…☆17Updated 2 months ago
- A collection of models for organizing, prioritizing, and understanding cybersecurity and information risk management concepts.☆19Updated last month