TaaC-AI
Threat analyzer
An AI-driven tool for analyzing service descriptions and identifying security threats.
AI-driven Threat modeling-as-a-Code (TaaC-AI)
114 stars
5 watching
12 forks
Language: HTML
last commit: 6 months ago
Linked from 1 awesome list
aiapplication-securityclaude-3devsecopsgptgpt-3gpt-4llm-securitymistral-7bsecure-developmenttaacthreatthreat-modelingthreat-modeling-from-codethreat-modeling-toolthreat-models
Related projects:
Repository | Description | Stars |
---|---|---|
a3sal0n/cyberthreathunting | A collection of tools and resources for threat hunters to identify and respond to cyber threats. | 855 |
owasp/pytm | Automates threat modeling and documentation for software systems. | 919 |
kevthehermit/pastehunter | Automates scanning of publicly hosted pasted data against Yara rules to identify potential security or research threats. | 1,065 |
atc-project/atomic-threat-coverage | A framework for generating actionable analytics to combat threats based on threat modeling and incident response | 972 |
p8a/yara-java | Java bindings for Yara threat analysis | 23 |
yelp/threat_intel | Provides APIs for threat intelligence data from Umbrella Investigate and other sources | 274 |
inquest/threatingestor | Extracts and aggregates threat intelligence from various sources | 831 |
telefonica/attpwn | A tool for simulating and analyzing potential security threats to Microsoft Windows systems using the MITRE ATT&CK framework. | 208 |
svdwi/bluebox | Analyzes and enriches threat intelligence data from various sources to help detect malicious files, URLs, and domains. | 38 |
stratosphereips/manati | A tool to assist threat analysts in discovering new security problems using machine learning | 112 |
miladaslaner/threathunt | A PowerShell repository to simulate and train threat hunting skills without malicious files. | 134 |
tripwire/tardis | An intelligence platform for threat analysis and incident response | 121 |
aboutsecurity/rastrea2r | A tool for hunting and tracking Internet of Things (IoT) security threats by collecting and analyzing indicators of compromise (IOCs) | 116 |
mlsecproject/tiq-test | Analyzes threat intelligence feeds using statistical methods and data visualization. | 171 |
gossithedog/threathunting | Tools and rules for detecting malicious domain calls in endpoint malware | 568 |