JosephTLucas / jupysec
A JupyterLab extension to evaluate the security of your Jupyter environment
☆39Updated last year
Alternatives and similar repositories for jupysec:
Users that are interested in jupysec are comparing it to the libraries listed below
- ☆65Updated 4 months ago
- A security-first linter for code that shouldn't need linting☆16Updated last year
- An interactive CLI application for interacting with authenticated Jupyter instances.☆53Updated last year
- A YAML based format for describing tools to LLMs, like man pages but for robots!☆69Updated last week
- ATLAS tactics, techniques, and case studies data☆63Updated last month
- using ML models for red teaming☆43Updated last year
- Secure Jupyter Notebooks and Experimentation Environment☆74Updated 2 months ago
- Security and compliance proxy for LLM APIs☆46Updated last year
- Do You Know What's In Your Python Packages? A Tool for Visualizing Python Package Registry Security Audit Data☆19Updated 2 years ago
- A utility to inspect, validate, sign and verify machine learning model files.☆55Updated 2 months ago
- GPT-3 use cases for Cybersecurity☆52Updated last year
- Improve prompts for e.g. GPT3 and GPT-J using templates and hyperparameter optimization.☆42Updated 2 years ago
- 🤖 A GitHub action that leverages fabric patterns through an agent-based approach☆25Updated 3 months ago
- A productionized greedy coordinate gradient (GCG) attack tool for large language models (LLMs)☆98Updated 4 months ago
- Automated vulnerability discovery and annotation☆66Updated 8 months ago
- Tree of Attacks (TAP) Jailbreaking Implementation☆106Updated last year
- Data Scientists Go To Jupyter☆62Updated last month
- Payloads for Attacking Large Language Models☆79Updated 9 months ago
- A simple tool to create mermaid js markdown charts from CVE IDs and CVE keyword searches.☆43Updated 2 years ago
- An example vulnerable app that integrates an LLM☆17Updated last year
- ChainReactor is a research project that leverages AI planning to discover exploitation chains for privilege escalation on Unix systems. T…☆44Updated 5 months ago
- Trail of Bits Testing Handbook☆72Updated 2 weeks ago
- Neo4j Cybersecurity Demo☆18Updated 3 years ago
- A collection of prompt injection mitigation techniques.☆22Updated last year
- A library to produce cybersecurity exploitation routes (exploit flows). Inspired by TensorFlow.☆35Updated last year
- Manager of third-party sources of Semgrep rules 🗂☆81Updated 9 months ago
- List of ML file formats☆51Updated last year
- Machine Learning Attack Series☆60Updated 11 months ago
- Secret Scanner for Slack, Jira, Confluence, Asana, Wrike, Linear, Zendesk, and GitHub☆56Updated this week
- ☆24Updated 3 months ago