- British Columbia, Canada
- https://josephkirwin.com
Stars
🔥🔒 Awesome MCP (Model Context Protocol) Security 🖥️
Linux Kernel Defence Map shows the relationships between vulnerability classes, exploitation techniques, bug detection mechanisms, and defence technologies
Allows you to use AWS KMS asymmetric keys as PGP/GPG keys.
Certified Kubernetes Administrator - CKA Course
🧪 Correlate Semgrep scans with Python test coverage to prioritize SAST findings and get bug fix suggestions via a self-hosted LLM.
An AI-powered threat modeling tool that leverages OpenAI's GPT models to generate threat models for a given application based on the STRIDE methodology.
Intel’s HERACLES accelerator introduces a new set of fundamental instructions, the Polynomial Instructions Set Architecture (P-ISA) that operates directly on polynomials requiring a completely new …
Wikiwatchdog uncovers organizations editing Wikipedia anonymously
A library for mechanistic interpretability of GPT-style language models
Library to torify application - NOTE: upstream has been moved to https://gitweb.torproject.org/torsocks.git
A framework for serving and evaluating LLM routers - save LLM costs without compromising quality
Gram is Klarna's own threat model diagramming tool
A command line tool that validates AWS IAM Policies in a Terraform template against AWS IAM best practices
Awesome secure by default libraries to help you eliminate bug classes!
Factor Analysis of Information Risk (FAIR) model written in Python. Managed and maintained by Hive Systems
OpenID Shared Signals Working Group Repository
A curated list of awesome GraphQL Security frameworks, libraries, software and resources
A comprehensive list of software composition analysis tools.
Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.
Example policies demonstrating how to implement a data perimeter on AWS.
Collection of example Service Control Policies (SCPs) that are useful for sandbox and training AWS accounts.
HTTP proxy that injects 3rd party credentials into requests
An open source threat modeling tool from OWASP