xvnpw / ai-threat-modeling-actionView external linksLinks
AI featured threat modeling and security review action
☆45Nov 17, 2024Updated last year
Alternatives and similar repositories for ai-threat-modeling-action
Users that are interested in ai-threat-modeling-action are comparing it to the libraries listed below
Sorting:
- AI featured threat modeling and security review project☆17Nov 17, 2024Updated last year
- Top 2025 Vulnerabilities You Shouldn’t Accept in a Pentest Report☆14Feb 6, 2025Updated last year
- Collection of Semgrep rules for security analysis☆10Mar 30, 2024Updated last year
- CDS Threat Modeling Tool MVP☆14Updated this week
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆103Oct 13, 2025Updated 4 months ago
- Generative AI-based CyberSecurity-focused Prompt Dataset for Benchmarking Large Language Models☆32Jan 14, 2025Updated last year
- A tool to audit Erlang & Elixir dependencies, to make sure your ✨ gleam projects really sparkle!☆23Jan 5, 2026Updated last month
- PEACH - a step-by-step framework for modeling and improving SaaS and PaaS tenant isolation, by managing the attack surface exposed by use…☆74Dec 14, 2022Updated 3 years ago
- boostsecurityio/lotp☆138Jan 25, 2026Updated 3 weeks ago
- Infrastructure as Natural Language☆46Oct 28, 2023Updated 2 years ago
- ☆18Jun 11, 2024Updated last year
- A web security research tool for DOM testing☆24Feb 7, 2026Updated last week
- PII detection platform, leveraging human-in-the-loop AI☆54Nov 29, 2024Updated last year
- Proof-of-concept code for research into GitHub Actions Cache poisoning.☆21Mar 9, 2025Updated 11 months ago
- Local CLI tool for browser extension risk analysis☆27Apr 11, 2025Updated 10 months ago
- ☆57Feb 9, 2026Updated last week
- Cloud Commotion intends to cause chaos to simulate security incidents☆145Jun 18, 2024Updated last year
- A python script to create a fake GitHub runner and hijack pipeline jobs to leak CI/CD secrets.☆27Oct 13, 2024Updated last year
- Supply-Chain Firewall (SCFW) is a tool for preventing the installation of malicious npm and PyPI packages☆214Feb 10, 2026Updated last week
- Unauthenticated enumeration of AWS IAM Roles.☆26Sep 7, 2025Updated 5 months ago
- ☆114Jun 8, 2023Updated 2 years ago
- Simple plug-and-play Github Action to block unauthorized outbound traffic (egress) in your Github workflows☆117Feb 9, 2026Updated last week
- A tool to uncover undocumented APIs from the AWS Console.☆116Apr 29, 2025Updated 9 months ago
- ☆30Jul 29, 2021Updated 4 years ago
- EZGHSA is a command-line tool for summarizing and filtering vulnerability alerts on Github repositories.☆35Jan 4, 2026Updated last month
- ☆116Updated this week
- Jumpstart multiple WebSocket servers quickly☆32Nov 23, 2021Updated 4 years ago
- Find potential Indicators of Compromise among similar Linux servers☆29Oct 28, 2017Updated 8 years ago
- Monitoring GitHub for sensitive data shared publicly☆66Dec 20, 2021Updated 4 years ago
- Mapping from bug bounty and vulnerability disclosure programs to respective GitHub organizations☆85Updated this week
- Practical resources for offensive CI/CD security research. Curated the best resources I've seen since 2021.☆570Jan 28, 2026Updated 2 weeks ago
- 🖇️ equivalence table between OWASP ASVS standard and STRIDE threat modeling methodology.☆76Aug 22, 2024Updated last year
- Dragon-GPT uses Chat-GPT, or local LLM, to execute automatic and AI-powered threat modeling analysis on a given OWASP Threat Dragon diagr…☆41Jun 20, 2025Updated 7 months ago
- ☆35Dec 10, 2020Updated 5 years ago
- Automated management of ad campaigns in Google Display&Video 360.☆14Feb 9, 2026Updated last week
- A thin async wrapper for SQLAlchemy sessions☆10Sep 13, 2021Updated 4 years ago
- A curated list of awesome 🏧 hacking resources.☆14Dec 4, 2025Updated 2 months ago
- Log monitor for Rekor to verify immutability and monitor entries☆45Feb 9, 2026Updated last week
- This GitHub Action sends a reverse shell from a runner via Azure Storage Account blobs☆39Sep 25, 2024Updated last year