NetsecExplained / Attacking-and-Defending-Generative-AILinks
Reference notes for Attacking and Defending Generative AI presentation
☆65Updated last year
Alternatives and similar repositories for Attacking-and-Defending-Generative-AI
Users that are interested in Attacking-and-Defending-Generative-AI are comparing it to the libraries listed below
Sorting:
- ☆66Updated last week
- source code for the offsecml framework☆41Updated last year
- Vulnerability impact analyzer that reduces false positives in SCA tools by performing intelligent code analysis. Uses agentic AI with ope…☆57Updated 6 months ago
- LLM Testing Findings Templates☆72Updated last year
- A productionized greedy coordinate gradient (GCG) attack tool for large language models (LLMs)☆133Updated 8 months ago
- Code Repository for: AIRTBench: Measuring Autonomous AI Red Teaming Capabilities in Language Models☆77Updated this week
- Awesome products for securing AI systems includes open source and commercial options and an infographic licensed CC-BY-SA-4.0.☆70Updated last year
- ☆42Updated 9 months ago
- ☆53Updated last week
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆90Updated 2 weeks ago
- An experimental project using LLM technology to generate security documentation for Open Source Software (OSS) projects☆34Updated 6 months ago
- ☆38Updated 8 months ago
- ☆17Updated 5 months ago
- Payloads for Attacking Large Language Models☆99Updated 3 months ago
- AI-Powered, Local Pythonic Coding Agent 🐞💻☆24Updated 6 months ago
- CALDERA plugin for adversary emulation of AI-enabled systems☆99Updated 2 years ago
- A fun POC that is built to understand AI security agents.☆32Updated 8 months ago
- TTPMapper is an AI-driven threat intelligence parser that converts unstructured reports whether from web URLs or PDF files into structure…☆45Updated 2 months ago
- ☆307Updated last month
- A research project to add some brrrrrr to Burp☆189Updated 7 months ago
- Payloads for AI Red Teaming and beyond☆274Updated 2 weeks ago
- NOVA: The Prompt Pattern Matching☆168Updated last month
- A YAML based format for describing tools to LLMs, like man pages but for robots!☆78Updated 4 months ago
- A PoC to Simulate Ransomware Attack on AWS Environment☆32Updated 11 months ago
- RansomWhen is a tool to enumerate identities that can lock S3 Buckets using KMS, resulting in ransomwares, as well as detect occurances o…☆56Updated 7 months ago
- Verizon Burp Extensions: AI Suite☆138Updated 4 months ago
- Delving into the Realm of LLM Security: An Exploration of Offensive and Defensive Tools, Unveiling Their Present Capabilities.☆164Updated last year
- Performing secure code review with LLMs (and vibe coding IDEs)☆25Updated last month
- Build a CVE library with aggregated CISA, EPSS and CVSS data☆29Updated last year
- An experimental project exploring the use of Large Language Models (LLMs) to solve HackTheBox machines autonomously.☆61Updated last week