Cyb3rWard0g / flokiLinks
Agentic Workflows Made Simple
☆152Updated 6 months ago
Alternatives and similar repositories for floki
Users that are interested in floki are comparing it to the libraries listed below
Sorting:
- NOVA: The Prompt Pattern Matching☆173Updated last month
- Threat model for Azure Storage - Library of all the attack scenarios on Azure Storage, and how to mitigate them following a risk-based ap…☆59Updated 2 years ago
- ☆47Updated last week
- Automation tool for Windows Deception Host Burn-In☆86Updated 9 months ago
- Mapping of open-source detection rules and atomic tests.☆176Updated 8 months ago
- A knowledge source about TTPs used to target GenAI-based systems, copilots and agents☆120Updated last month
- Code Repository for: AIRTBench: Measuring Autonomous AI Red Teaming Capabilities in Language Models☆77Updated this week
- ☆64Updated last year
- An index of publicly available and open-source threat detection rulesets.☆124Updated 5 months ago
- BlackCat is a PowerShell module designed to validate the security of Microsoft Azure. It provides a set of functions to identify potentia…☆147Updated last week
- ☆75Updated 6 months ago
- An AI-powered tool for discovering privilege escalation opportunities in AWS IAM configurations.☆115Updated 2 weeks ago
- Microsoft Threat Intelligence☆191Updated last week
- This is a repository to experiment with MCP for security☆43Updated 7 months ago
- AI-powered tool designed to help producing Threat Intelligence Mindmap.☆103Updated 3 months ago
- ☆92Updated this week
- 🛡️ SIGMA Detection Engineering Platform A comprehensive AI-powered detection engineering platform for security teams to explore MITRE AT…☆43Updated 2 months ago
- 🤖 A GitHub action that leverages fabric patterns through an agent-based approach☆32Updated 8 months ago
- A small security playground implementation of GHOSTS User Simulation framework with an Active Directory deployment and Elastic.☆18Updated last year
- Red Teaming for AI and Cloud☆196Updated 3 months ago
- HoneyAgents is a PoC demo of an AI-driven system that combines honeypots with autonomous AI agents to detect and mitigate cyber threats. …☆56Updated last year
- Intel Retrieval Augmented Generation (RAG) Utilities☆90Updated last year
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆78Updated 2 weeks ago
- ☆75Updated last year
- REST server that can analyze Kusto KQL queries against the Sentinel and Microsoft 365 Defender schemas.☆38Updated last month
- Cloud Analytics helps defenders detect attacks to their cloud infrastructure by developing behavioral analytics for cloud platforms as we…☆53Updated 2 years ago
- TTPMapper is an AI-driven threat intelligence parser that converts unstructured reports whether from web URLs or PDF files into structure…☆45Updated 2 months ago
- ☆116Updated 3 months ago
- Public repository to provide guidance and examples for people to start learning IaC. This repository also contains some open-hack style l…☆23Updated 2 years ago
- ☆96Updated last month