AI featured threat modeling and security review action
☆46Nov 17, 2024Updated last year
Alternatives and similar repositories for ai-threat-modeling-action
Users that are interested in ai-threat-modeling-action are comparing it to the libraries listed below
Sorting:
- AI featured threat modeling and security review project☆17Nov 17, 2024Updated last year
- Top 2025 Vulnerabilities You Shouldn’t Accept in a Pentest Report☆14Feb 6, 2025Updated last year
- CDS Threat Modeling Tool MVP☆14Updated this week
- Collection of Semgrep rules for security analysis☆10Mar 30, 2024Updated last year
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆104Oct 13, 2025Updated 4 months ago
- Generative AI-based CyberSecurity-focused Prompt Dataset for Benchmarking Large Language Models☆32Jan 14, 2025Updated last year
- A tool to audit Erlang & Elixir dependencies, to make sure your ✨ gleam projects really sparkle!☆23Jan 5, 2026Updated 2 months ago
- PEACH - a step-by-step framework for modeling and improving SaaS and PaaS tenant isolation, by managing the attack surface exposed by use…☆75Dec 14, 2022Updated 3 years ago
- Segment's Threat Modeling training for our engineers☆245May 4, 2021Updated 4 years ago
- boostsecurityio/lotp☆139Mar 3, 2026Updated last week
- Infrastructure as Natural Language☆46Oct 28, 2023Updated 2 years ago
- A web security research tool for DOM testing☆24Feb 7, 2026Updated last month
- PII detection platform, leveraging human-in-the-loop AI☆54Nov 29, 2024Updated last year
- Proof-of-concept code for research into GitHub Actions Cache poisoning.☆21Mar 9, 2025Updated last year
- Local CLI tool for browser extension risk analysis☆27Apr 11, 2025Updated 11 months ago
- A GitHub Actions Supply Chain CTF / Goat☆26Jan 6, 2026Updated 2 months ago
- ☆58Updated this week
- Cloud Commotion intends to cause chaos to simulate security incidents☆146Jun 18, 2024Updated last year
- Supply-Chain Firewall (SCFW) is a tool for preventing the installation of malicious npm and PyPI packages☆218Updated this week
- A python script to create a fake GitHub runner and hijack pipeline jobs to leak CI/CD secrets.☆28Oct 13, 2024Updated last year
- Unauthenticated enumeration of AWS IAM Roles.☆26Sep 7, 2025Updated 6 months ago
- Example repository for GitHub Actions Time of Check to Time of Use (TOCTOU vulnerabilities)☆35Jan 25, 2026Updated last month
- ☆114Jun 8, 2023Updated 2 years ago
- A tool to uncover undocumented APIs from the AWS Console.☆116Apr 29, 2025Updated 10 months ago
- ☆30Jul 29, 2021Updated 4 years ago
- EZGHSA is a command-line tool for summarizing and filtering vulnerability alerts on Github repositories.☆35Jan 4, 2026Updated 2 months ago
- ☆117Feb 11, 2026Updated last month
- Find potential Indicators of Compromise among similar Linux servers☆29Oct 28, 2017Updated 8 years ago
- Paramalyzer - Burp extension for parameter analysis of large-scale web application penetration tests.☆33Oct 13, 2022Updated 3 years ago
- Mapping from bug bounty and vulnerability disclosure programs to respective GitHub organizations☆85Updated this week
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆34Mar 7, 2022Updated 4 years ago
- 🖇️ equivalence table between OWASP ASVS standard and STRIDE threat modeling methodology.☆76Aug 22, 2024Updated last year
- ☆35Dec 10, 2020Updated 5 years ago
- Dragon-GPT uses Chat-GPT, or local LLM, to execute automatic and AI-powered threat modeling analysis on a given OWASP Threat Dragon diagr…☆41Jun 20, 2025Updated 8 months ago
- A thin async wrapper for SQLAlchemy sessions☆10Sep 13, 2021Updated 4 years ago
- Material for a tutorial on Bayesian analysis of survey data☆12Dec 30, 2025Updated 2 months ago
- This GitHub Action sends a reverse shell from a runner via Azure Storage Account blobs☆39Sep 25, 2024Updated last year
- OWASP Foundation web repository☆16Oct 11, 2025Updated 5 months ago
- System Validation Platform☆12Sep 18, 2025Updated 5 months ago