NetsecExplained / Attacking-and-Defending-Generative-AI
Reference notes for Attacking and Defending Generative AI presentation
☆37Updated 3 months ago
Related projects ⓘ
Alternatives and complementary repositories for Attacking-and-Defending-Generative-AI
- InfoSec OpenAI Examples☆19Updated 11 months ago
- LLM Testing Findings Templates☆65Updated 8 months ago
- source code for the offsecml framework☆35Updated 5 months ago
- Intelligence around common attacker behaviors (MITRE ATT&CK TTPs), in the form of ATT&CK Navigator "layer" json files.☆34Updated 2 years ago
- Attack Tool Timing and Reporting - Structured Attack Logging Format☆21Updated 2 years ago
- Awesome products for securing AI systems includes open source and commercial options and an infographic licensed CC-BY-SA-4.0.☆48Updated 5 months ago
- The Event Maturity Matrix (EMM) is a comprehensive framework that provides clarity regarding the capabilities and nuances of SaaS audit l…☆17Updated 2 months ago
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆61Updated this week
- AI featured threat modeling and security review project☆12Updated 7 months ago
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆44Updated 3 weeks ago
- ☆20Updated last month
- AI featured threat modeling and security review action☆40Updated 5 months ago
- An LLM and OCR based Indicator of Compromise Extraction Tool☆30Updated 7 months ago
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆19Updated 3 months ago
- ☆15Updated last year
- ☆69Updated this week
- Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop☆56Updated last month
- Intel Retrieval Augmented Generation (RAG) Utilities☆87Updated 9 months ago
- Collect chrome extensions from various devices and find out if they are malicious☆22Updated 2 months ago
- ☆184Updated 3 months ago
- CALDERA plugin for adversary emulation of AI-enabled systems☆85Updated last year
- Slackhound allows red and blue teams to perform fast reconnaissance on Slack workspaces/organizations to quickly search user profiles, lo…☆74Updated 9 months ago
- OWASP Amass Docker Compose for setting up a full instance of the infrastructure☆28Updated 3 weeks ago
- ☆98Updated 5 months ago
- A PoC to Simulate Ransomware Attack on AWS Environment☆26Updated last month
- powershell script to simulate activity by a user☆20Updated 4 years ago
- Technical Tabletop Exercises Simulation Framework☆45Updated last year
- Data Scientists Go To Jupyter☆57Updated 2 years ago
- Virtual Security Operations Center☆49Updated last year