Cyb3rWard0g / flokiLinks
Agentic Workflows Made Simple
☆159Updated 8 months ago
Alternatives and similar repositories for floki
Users that are interested in floki are comparing it to the libraries listed below
Sorting:
- Code Repository for: AIRTBench: Measuring Autonomous AI Red Teaming Capabilities in Language Models☆90Updated last week
- ☆98Updated 2 weeks ago
- Automation tool for Windows Deception Host Burn-In☆86Updated last year
- NOVA: The Prompt Pattern Matching☆57Updated last month
- Threat model for Azure Storage - Library of all the attack scenarios on Azure Storage, and how to mitigate them following a risk-based ap…☆59Updated 2 years ago
- A small security playground implementation of GHOSTS User Simulation framework with an Active Directory deployment and Elastic.☆19Updated last year
- Benchmarking LLM agents on Cyber Threat Investigation.☆105Updated last week
- Mapping of open-source detection rules and atomic tests.☆189Updated 10 months ago
- ☆75Updated 8 months ago
- ☆55Updated last month
- An index of publicly available and open-source threat detection rulesets.☆132Updated 7 months ago
- BlackCat is a PowerShell module designed to validate the security of Microsoft Azure. It provides a set of functions to identify potentia…☆152Updated last month
- A comprehensive GenAI protection system designed to protect against malicious prompts, injection attacks, and harmful content. System inc…☆95Updated last month
- ☆65Updated last year
- This is a repository to experiment with MCP for security☆44Updated 10 months ago
- ☆80Updated last year
- Red Teaming for AI and Cloud☆199Updated this week
- 🛡️ SIGMA Detection Engineering Platform A comprehensive AI-powered detection engineering platform for security teams to explore MITRE AT…☆43Updated 5 months ago
- Public repository to provide guidance and examples for people to start learning IaC. This repository also contains some open-hack style l…☆23Updated 2 years ago
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆101Updated last year
- A knowledge source about TTPs used to target GenAI-based systems, copilots and agents☆129Updated 2 months ago
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆82Updated 3 weeks ago
- 🤖 A GitHub action that leverages fabric patterns through an agent-based approach☆32Updated 11 months ago
- Online resources related to Detection Engineering. Detection rules, detection logic, attack samples, detection tests and emulation tools…☆133Updated 2 weeks ago
- REST server that can analyze Kusto KQL queries against the Sentinel and Microsoft 365 Defender schemas.☆44Updated 2 months ago
- AI-powered tool designed to help producing Threat Intelligence Mindmap.☆104Updated 6 months ago
- Proximity is a MCP security scanner powered with NOVA☆257Updated 2 months ago
- An Azure SPN access minimizer☆43Updated 3 weeks ago
- ☆21Updated last week
- Welcome to the Cloud Security Toolkit repository, your all-in-one destination for cutting-edge cloud security resources! Whether you're d…☆38Updated last month