NetsecExplained / Attacking-and-Defending-Generative-AI
Reference notes for Attacking and Defending Generative AI presentation
☆37Updated 3 months ago
Related projects ⓘ
Alternatives and complementary repositories for Attacking-and-Defending-Generative-AI
- InfoSec OpenAI Examples☆19Updated 11 months ago
- LLM Testing Findings Templates☆65Updated 9 months ago
- source code for the offsecml framework☆35Updated 5 months ago
- Tools to measure the maturity of Enterprise Security Architecture processes☆12Updated 7 years ago
- An LLM and OCR based Indicator of Compromise Extraction Tool☆31Updated 7 months ago
- Awesome products for securing AI systems includes open source and commercial options and an infographic licensed CC-BY-SA-4.0.☆48Updated 5 months ago
- ☆185Updated this week
- Workshop resources and materials for Workshop presented at DefCon and other security conferences - Creating and Uncovering Malicious Cont…☆43Updated 7 months ago
- ☆27Updated 2 years ago
- ☆74Updated last week
- Data Scientists Go To Jupyter☆57Updated this week
- Docs: Vulnerability management aggregation of AppSec & OpSec (Tools Listing)☆30Updated last year
- ☆99Updated 5 months ago
- ☆18Updated 3 weeks ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆27Updated 2 years ago
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆44Updated 3 weeks ago
- GCP GOAT is the vulnerable application for learn the GCP Security☆62Updated last year
- A PoC to Simulate Ransomware Attack on AWS Environment☆27Updated last month
- Intel Retrieval Augmented Generation (RAG) Utilities☆88Updated 9 months ago
- Automatic Sender Policy Framework Reconnaissance☆18Updated 6 years ago
- This project is a Terraform-based implementation for deploying a Security Operations Center (SOC) using Kali Linux in AWS. It provides an…☆15Updated this week
- Tree of Attacks (TAP) Jailbreaking Implementation☆95Updated 9 months ago
- AI featured threat modeling and security review action☆40Updated this week
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆61Updated this week
- Technical Tabletop Exercises Simulation Framework☆45Updated last year
- Learn how to get more out of publicly available threat reports to help improve the security posture of your organization! TLP: White Thre…☆15Updated last year
- Dictionary cracking tool for HTTP Digest challenge/response hashes☆29Updated last year
- Payloads for Attacking Large Language Models☆64Updated 4 months ago
- ☆66Updated 6 months ago