xvnpw / sec-docs
An experimental project using LLM technology to generate security documentation for Open Source Software (OSS) projects
☆28Updated 2 months ago
Alternatives and similar repositories for sec-docs:
Users that are interested in sec-docs are comparing it to the libraries listed below
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆76Updated this week
- A comprehensive checklist and guide for organizations looking to implement a robust cybersecurity program☆26Updated last week
- A fun POC that is built to understand AI security agents.☆31Updated 4 months ago
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆94Updated last year
- 🖇️ STRIDE vs. ASVS equivalence table☆76Updated 8 months ago
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆58Updated last year
- AI featured threat modeling and security review action☆43Updated 5 months ago
- ☆41Updated 2 months ago
- ☆36Updated 4 months ago
- A tool to keep AWS pentests and red teams efficient, organized, and stealthy.☆91Updated last year
- LLM Testing Findings Templates☆71Updated last year
- POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRF☆58Updated last year
- Cloud Offensive Breach and Risk Assessment (COBRA) Tool☆92Updated 2 months ago
- An LLM and OCR based Indicator of Compromise Extraction Tool☆33Updated 5 months ago
- ☆180Updated 3 weeks ago
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆140Updated 4 months ago
- https://breaches.cloud☆39Updated 6 months ago
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆75Updated last year
- A full insecure kubernetes application for testing security tools☆85Updated 2 weeks ago
- This provides a guided step by step walkthrough for threat modeling with MITRE ATT&CK Framework☆28Updated 2 months ago
- Generates runbooks for GuardDuty findings☆35Updated 10 months ago
- ☆18Updated 3 years ago
- Cloud Analytics helps defenders detect attacks to their cloud infrastructure by developing behavioral analytics for cloud platforms as we…☆53Updated 2 years ago
- ☆65Updated 11 months ago
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆41Updated last year
- RansomWhen is a tool to enumerate identities that can lock S3 Buckets using KMS, resulting in ransomwares, as well as detect occurances o…☆45Updated 3 months ago
- AI featured threat modeling and security review project☆16Updated 5 months ago
- An evolving repository of CloudTrail events with detailed descriptions, MITRE ATT&CK insights, real-world incidents, references and secur…☆159Updated last week
- One Conference 2024☆109Updated 7 months ago
- Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Security Management.☆31Updated 6 months ago