NetsecExplained / Attacking-and-Defending-Generative-AI
Reference notes for Attacking and Defending Generative AI presentation
☆56Updated 9 months ago
Alternatives and similar repositories for Attacking-and-Defending-Generative-AI
Users that are interested in Attacking-and-Defending-Generative-AI are comparing it to the libraries listed below
Sorting:
- LLM Testing Findings Templates☆72Updated last year
- An experimental project using LLM technology to generate security documentation for Open Source Software (OSS) projects☆28Updated 2 months ago
- ☆39Updated this week
- ☆36Updated 4 months ago
- source code for the offsecml framework☆40Updated 11 months ago
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆76Updated this week
- One Conference 2024☆109Updated 7 months ago
- ☆15Updated last month
- AI featured threat modeling and security review project☆16Updated 5 months ago
- ☆39Updated 5 months ago
- InfoSec OpenAI Examples☆19Updated last year
- Vulnerability impact analyzer that reduces false positives in SCA tools by performing intelligent code analysis. Uses agentic AI with ope…☆53Updated 2 months ago
- AI-Powered, Local Pythonic Coding Agent 🐞💻☆23Updated 2 months ago
- A research project to add some brrrrrr to Burp☆160Updated 3 months ago
- Verizon Burp Extensions: AI Suite☆128Updated 2 weeks ago
- A fun POC that is built to understand AI security agents.☆31Updated 4 months ago
- Autonomous AI C2☆30Updated 9 months ago
- ☆41Updated 2 months ago
- Awesome products for securing AI systems includes open source and commercial options and an infographic licensed CC-BY-SA-4.0.☆62Updated 10 months ago
- Blogpost series showcasing interesting cloud - web app security bugs☆47Updated last year
- AI featured threat modeling and security review action☆43Updated 5 months ago
- A tool to keep AWS pentests and red teams efficient, organized, and stealthy.☆91Updated last year
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆94Updated last year
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆41Updated last year
- NOVA: The Prompt Pattern Matching☆75Updated 2 weeks ago
- A Model Context Protocol server that connects AI assistants like Claude to AWS security services, allowing them to autonomously query, in…☆39Updated last week
- A collection of Turbo Intruder scripts.☆59Updated 3 months ago
- A comprehensive knowledge base for security professionals to keep track of and build defenses against API attack techniques.☆43Updated 8 months ago
- This repository hosts several snippets and file related to the BsidesLV 2024 talk about Shadow and Zombie APIs by me☆18Updated 9 months ago
- RansomWhen is a tool to enumerate identities that can lock S3 Buckets using KMS, resulting in ransomwares, as well as detect occurances o…☆45Updated 3 months ago