An experimental project using LLM technology to generate security documentation for Open Source Software (OSS) projects
☆34Feb 28, 2025Updated last year
Alternatives and similar repositories for sec-docs
Users that are interested in sec-docs are comparing it to the libraries listed below
Sorting:
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆104Oct 13, 2025Updated 4 months ago
- AI featured threat modeling and security review project☆17Nov 17, 2024Updated last year
- A fun POC that is built to understand AI security agents.☆34Oct 30, 2025Updated 4 months ago
- MCP Server that integrates with Security Copilot, Sentinel and other tools (in the future). It enhance the process of developing , testin…☆20Oct 8, 2025Updated 4 months ago
- A Burp Suite extension for Lightning/Aura framework security testing with advanced action management, context editing, and comprehensive …☆54Nov 17, 2025Updated 3 months ago
- An extension to use Semgrep inside Burp Suite.☆88May 23, 2025Updated 9 months ago
- MyOpenVDP is a free web application to install a vulnerability disclosure policy or a vulnerability disclosure program on your assets. (V…☆32Aug 8, 2024Updated last year
- Caterpillar is a security scanning library for AI agent skill files (e.g., Claude Code skills) for dangerous or malicious behavior☆33Feb 16, 2026Updated 2 weeks ago
- NOVA: The Prompt Pattern Matching☆98Jan 27, 2026Updated last month
- Vulnerability impact analyzer that reduces false positives in SCA tools by performing intelligent code analysis. Uses agentic AI with ope…☆64Feb 22, 2025Updated last year
- Docs: Vulnerability management aggregation of AppSec & OpSec (Tools Listing)☆32Apr 21, 2023Updated 2 years ago
- 🛡️ SIGMA Detection Engineering Platform A comprehensive AI-powered detection engineering platform for security teams to explore MITRE AT…☆46Jun 28, 2025Updated 8 months ago
- A wrapper around jq, to help you parse jq output!☆30Aug 23, 2020Updated 5 years ago
- 🤖 A GitHub action that leverages fabric patterns through an agent-based approach☆34Jan 4, 2025Updated last year
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆40May 7, 2023Updated 2 years ago
- Dragon-GPT uses Chat-GPT, or local LLM, to execute automatic and AI-powered threat modeling analysis on a given OWASP Threat Dragon diagr…☆41Jun 20, 2025Updated 8 months ago
- A powerful, easy to use and intuitive way to create network analysis charts☆15Feb 23, 2026Updated last week
- OWASP Foundation web repository☆16Oct 11, 2025Updated 4 months ago
- REST server that can analyze Kusto KQL queries against the Sentinel and Microsoft 365 Defender schemas.☆51Sep 22, 2025Updated 5 months ago
- ☆87Feb 20, 2026Updated last week
- A comprehensive checklist and guide for organizations looking to implement a robust cybersecurity program☆46Feb 2, 2026Updated last month
- An AI-powered threat modeling tool that leverages OpenAI's GPT models to generate threat models for a given application based on the STRI…☆991Updated this week
- https://breaches.cloud☆42Oct 16, 2024Updated last year
- MPC Server for PySpark inpired by the LakeSail☆17Updated this week
- Secure access cloud terraform provider☆13Feb 24, 2026Updated last week
- Live validation proxy tool for testing web app vulnerabilities☆831Feb 14, 2026Updated 2 weeks ago
- A security assessment tool for Hitachi Vantara's Pentaho Business Analytics platform.☆13Oct 31, 2021Updated 4 years ago
- Python Wrapper for the Frantrax API☆17Jan 1, 2026Updated 2 months ago
- A curated list of awesome 🏧 hacking resources.☆17Dec 4, 2025Updated 2 months ago
- QueryGPT-ADK is an open-source, multi-agent system for natural language to SQL query generation and explanation. It leverages LLMs and v…☆16Jul 23, 2025Updated 7 months ago
- Ransomware dataset, containing dynamic behaviour of more than 60 distinct ransomware families.☆10Aug 29, 2022Updated 3 years ago
- Utility functions for dbt projects running on Athena☆12Mar 25, 2025Updated 11 months ago
- Claude MCP server to perform analysis on ROADrecon data☆48Mar 30, 2025Updated 11 months ago
- Bounty Prompt is an Open-Source Burp Suite extension by Bounty Security that leverages advanced AI via Burp AI and Groq AI. It enables us…☆115Feb 23, 2025Updated last year
- ✨ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The …☆289Feb 5, 2024Updated 2 years ago
- Custom security ruleset for the popular Java static analysis tool PMD.☆61Nov 18, 2015Updated 10 years ago
- ☆10May 14, 2025Updated 9 months ago
- This GitHub Action use kaniko and Amazon Linux container with nitro-cli to build a reproducible AWS Nitro Enclaves EIF file and its infor…☆11Jul 2, 2024Updated last year
- The Super Vulnerable Java Application (SVJA), as demonstrated in the Roniel and DaRon Podcast Show, is an Apache Struts application desig…☆13Jan 1, 2026Updated 2 months ago