yevh / TaaC-AI
AI-driven Threat modeling-as-a-Code (TaaC-AI)
☆125Updated 8 months ago
Alternatives and similar repositories for TaaC-AI:
Users that are interested in TaaC-AI are comparing it to the libraries listed below
- Site-Scanner - Web application vulnerability assessment tool.☆45Updated 6 months ago
- The Unofficial Stremio iOS App☆13Updated 2 weeks ago
- Ultra-fast, low latency LLM prompt injection/jailbreak detection ⛓️☆111Updated 6 months ago
- A layer-based alternative to Karabiner Elements UI☆42Updated 4 months ago
- ☆9Updated 8 months ago
- This Python package simplifies generating documentation for functions and methods in designated modules or libraries. It enables effortle…☆60Updated 9 months ago
- Konomi Viewer is not just a hitomi downloader. It is a perfect hitomi.la desktop application with all the features you want.☆59Updated 9 months ago
- IntelligentMonitor aims to improve monitoring and observability in complex, distributed DevOps environments by leveraging machine learnin…☆6Updated 10 months ago
- bolt is a blockchain.☆12Updated 7 months ago
- CYBRIA - Pioneering Federated Learning for Privacy-Aware Cybersecurity with Brilliance☆4Updated 10 months ago
- OWASP Machine Learning Security Top 10 Project☆80Updated 3 weeks ago
- OWASP Foundation Web Respository☆234Updated this week
- This repository contains scripts, programs, and code that can be used for a multitude of purposes. All code is well-documented, making it…☆5Updated last year
- The Security Champion Framework provides both a measuring stick and a roadmap generator for Champion Programs.☆107Updated last year
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆171Updated 3 months ago
- Easy to use LLM Prompt Injection Detection / Detector Python Package☆24Updated this week
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆61Updated 7 months ago
- ☆36Updated last month
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆71Updated 9 months ago
- StartLeft is an automation tool for generating Threat Models written in the Open Threat Model (OTM) format from a variety of different so…☆49Updated last week
- AI featured threat modeling and security review action☆43Updated 3 months ago
- Semantic segmanitation for thin section of mineral stones☆1Updated 10 months ago
- Repository for on-going work as part of the AIBOM Tiger Team effort.☆18Updated 5 months ago
- OWASP Foundation Threat Dragon Project Web Repository☆76Updated last week
- ☆359Updated 10 months ago
- One Conference 2024☆105Updated 4 months ago
- Core model including reused documentation☆94Updated 5 months ago
- 🖇️ STRIDE vs. ASVS equivalence table☆75Updated 5 months ago
- ☆93Updated this week
- ☆218Updated last month