yevh / TaaC-AIView external linksLinks
AI-driven Threat modeling-as-a-Code (TaaC-AI)
☆160Jun 29, 2025Updated 7 months ago
Alternatives and similar repositories for TaaC-AI
Users that are interested in TaaC-AI are comparing it to the libraries listed below
Sorting:
- An AI-powered threat modeling tool that leverages OpenAI's GPT models to generate threat models for a given application based on the STRI…☆979Dec 28, 2025Updated last month
- This repository provides examples of Vulnerable and Mitigated code as per CWE Categorization.☆23May 4, 2024Updated last year
- AI featured threat modeling and security review project☆17Nov 17, 2024Updated last year
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆102Oct 13, 2025Updated 4 months ago
- A simple threat modeling tool to help humans to reduce time-to-value when threat modeling☆668Updated this week
- A Pythonic framework for threat modeling☆1,103Updated this week
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆68Jun 25, 2025Updated 7 months ago
- Do you want to learn AI Security but don't know where to start ? Take a look at this map.☆29Apr 23, 2024Updated last year
- A collection of permissively licensed Semgrep rules.☆22Jul 5, 2024Updated last year
- CDS Threat Modeling Tool MVP☆14Feb 6, 2026Updated last week
- Maturity Model Collaborative project☆15Feb 27, 2023Updated 2 years ago
- An experimental project using LLM technology to generate security documentation for Open Source Software (OSS) projects☆34Feb 28, 2025Updated 11 months ago
- Draw.io libraries for threat modeling diagrams☆785Nov 12, 2020Updated 5 years ago
- ☆13Oct 27, 2020Updated 5 years ago
- An online multiplayer version of the Elevation of Privilege (EoP) threat modeling card game☆159Jan 29, 2026Updated 2 weeks ago
- ☆16Apr 30, 2023Updated 2 years ago
- ☆21Aug 22, 2022Updated 3 years ago
- PoC exploits against various SGX enclaves☆14May 19, 2022Updated 3 years ago
- This project is about creating and publishing threat model examples.☆427Nov 10, 2021Updated 4 years ago
- 🧪 Correlate Semgrep scans with Python test coverage to prioritize SAST findings and get bug fix suggestions via a self-hosted LLM.☆42Dec 12, 2024Updated last year
- StartLeft is an automation tool for generating Threat Models written in the Open Threat Model (OTM) format from a variety of different so…☆52Nov 25, 2025Updated 2 months ago
- ☆69Jul 18, 2025Updated 6 months ago
- AI featured threat modeling and security review action☆45Nov 17, 2024Updated last year
- Binsec/Haunted is an extension of Binsec to verify speculative constant-time and detect Spectre attacks.☆17Oct 19, 2023Updated 2 years ago
- A web security research tool for DOM testing☆24Updated this week
- PII detection platform, leveraging human-in-the-loop AI☆54Nov 29, 2024Updated last year
- AWS honey token manager☆89Aug 1, 2024Updated last year
- A small tool to help developers understand a huge set of security requirements from appsec teams☆46Sep 2, 2022Updated 3 years ago
- Process Orchestration Framework: A camunda 7 fork☆20Updated this week
- Python GUI for seeing what's happening inside a fuzzer☆26Oct 1, 2021Updated 4 years ago
- threatspec - continuous threat modeling, through code☆376Dec 30, 2020Updated 5 years ago
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagrams☆106Jan 30, 2025Updated last year
- Core model including reused documentation☆101Dec 16, 2025Updated last month
- Intentionally Vulnerable Nodejs Application & APIs☆21Apr 9, 2022Updated 3 years ago
- An HTTP Response fuzzer to find Vulnerabilities in Security Scanners☆27Jun 18, 2024Updated last year
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆179Dec 11, 2025Updated 2 months ago
- public DNS data yielder☆29Feb 8, 2023Updated 3 years ago
- The Elevation of Privilege Threat Modeling Game☆340Jun 20, 2024Updated last year
- The OWASP DevSecOps Guideline explains how we can implement a secure pipeline and use best practices and introduce tools that we can use …☆82Dec 22, 2025Updated last month