An experimental project using LLM technology to generate security documentation for Open Source Software (OSS) projects
☆38Feb 28, 2025Updated last year
Alternatives and similar repositories for sec-docs
Users that are interested in sec-docs are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆107Oct 13, 2025Updated 6 months ago
- AI featured threat modeling and security review project☆17Nov 17, 2024Updated last year
- MCP Server that integrates with Security Copilot, Sentinel and other tools (in the future). It enhance the process of developing , testin…☆23Oct 8, 2025Updated 6 months ago
- 🛡️ SIGMA Detection Engineering Platform A comprehensive AI-powered detection engineering platform for security teams to explore MITRE AT…☆45Jun 28, 2025Updated 10 months ago
- Dragon-GPT uses Chat-GPT, or local LLM, to execute automatic and AI-powered threat modeling analysis on a given OWASP Threat Dragon diagr…☆42Jun 20, 2025Updated 10 months ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Docs: Vulnerability management aggregation of AppSec & OpSec (Tools Listing)☆32Apr 21, 2023Updated 3 years ago
- A lab environment for learning about MSTICPy☆38Feb 3, 2023Updated 3 years ago
- ☆19Sep 3, 2021Updated 4 years ago
- One Conference 2024☆110Oct 1, 2024Updated last year
- An extension to use Semgrep inside Burp Suite.☆88May 23, 2025Updated 11 months ago
- MyOpenVDP is a free web application to install a vulnerability disclosure policy or a vulnerability disclosure program on your assets. (V…☆34Aug 8, 2024Updated last year
- Focused malicious code detection ruleset, with a high protection-to-noise ratio☆146Feb 24, 2025Updated last year
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆11Oct 29, 2018Updated 7 years ago
- NOVA: The Prompt Pattern Matching☆132Jan 27, 2026Updated 3 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A malicious KeePass plugin to exfiltrate the master key.☆16Oct 25, 2021Updated 4 years ago
- Give AI agents secure access to your accounts - without sharing your credentials☆47Apr 15, 2026Updated 2 weeks ago
- Curated list of Open Source project focused on LLM security☆74Dec 23, 2025Updated 4 months ago
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆42May 7, 2023Updated 2 years ago
- An python script that use apkleaks to scan the android application over web☆11Jun 2, 2022Updated 3 years ago
- Vulnerability impact analyzer that reduces false positives in SCA tools by performing intelligent code analysis. Uses agentic AI with ope…☆66Feb 22, 2025Updated last year
- TrailAlerts is a AWS-native, serverless cloud-detection tool that lets you define simple rules as code and get rich alerts about events i…☆52Apr 5, 2026Updated 3 weeks ago
- A web API for various cyber threat intelligence frameworks, including MITRE ATT&CK, CWE, ATLAS...☆20Apr 21, 2026Updated last week
- ☆20Apr 10, 2025Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- 🤖 A GitHub action that leverages fabric patterns through an agent-based approach☆34Jan 4, 2025Updated last year
- Small tool to decode ASP.NET __VIEWSTATE variable when doing webpentests☆15Feb 27, 2021Updated 5 years ago
- Jenkins Security Research or Hacking Jenkins ;)☆12Dec 10, 2024Updated last year
- Top 2025 Vulnerabilities You Shouldn’t Accept in a Pentest Report☆14Feb 6, 2025Updated last year
- Authenticated independently verifiable agent delegation.☆33Dec 17, 2025Updated 4 months ago
- ☆17Mar 6, 2024Updated 2 years ago
- Live validation proxy tool for testing web app vulnerabilities☆852Mar 24, 2026Updated last month
- A simple web app to get the latest EPSS data for a CVE ID☆12Dec 14, 2025Updated 4 months ago
- ☆24Apr 17, 2023Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Host Internal Static Website on AWS☆17Dec 6, 2023Updated 2 years ago
- ☆45Apr 10, 2024Updated 2 years ago
- An open taxonomy and scoring framework for evaluating AI agent sandboxes: 7 defense layers, 7 threat categories, 3 evaluation dimensions,…☆60Apr 14, 2026Updated 2 weeks ago
- A comprehensive checklist and guide for organizations looking to implement a robust cybersecurity program☆47Feb 2, 2026Updated 3 months ago
- ☆15Sep 17, 2022Updated 3 years ago
- A Mixture‑of‑Experts Educational Framework for Adaptive Cybersecurity☆22Feb 8, 2026Updated 2 months ago
- An AI-powered threat modeling tool that leverages OpenAI's GPT models to generate threat models for a given application based on the STRI…☆1,020Apr 17, 2026Updated 2 weeks ago