hacking, bug bounty, appsec

Leveraging LLMs for Threat Modeling - Claude 3 Opus vs GPT-4


With new version of Claude model, I would like to compare it to GPT-4 in threat modeling.
Read more ⟶

Reviewing Your Architecture Using LLMs


The quality of input data is crucial for LLMs to perform effectively. Learn how you can use these LLMs to improve your architectural descriptions. Explore the new feature in my ai-threat-modeling-action GitHub action.
Read more ⟶

Leveraging LLMs for Threat Modeling - GPT-3.5 vs Claude 2 vs GPT-4


We put the leading AI models to the test in threat modeling. Let's dive into the results and see which one comes out on top.
Read more ⟶

Leveraging LLMs for Threat Modeling - GPT-3.5


In this article, I delve into the AI Nutrition-Pro experiment, a research project exploring the potential of LLMs in enhancing security practices during the design phase of DevSecOps: threat modeling and security review.
Read more ⟶