The AI Security Verification Standard (AISVS) focuses on providing developers, architects, and security professionals with a structured checklist to verify the security of AI-driven applications.
☆88Mar 17, 2026Updated this week
Alternatives and similar repositories for AISVS
Users that are interested in AISVS are comparing it to the libraries listed below
Sorting:
- This repository contains examples of information security policies, GDPR protocols and an operational security guide with examples of bes…☆11Apr 6, 2023Updated 2 years ago
- OWASP Foundation web repository☆44Mar 9, 2026Updated last week
- keep watching new bug bounty (vulnerability) postings.☆13Apr 7, 2024Updated last year
- A low-cost approach to testing AI chat experiences and security concepts☆40Jul 23, 2025Updated 7 months ago
- A comprehensive framework and assessment toolkit for measuring and improving Cloud Native security maturity across 8 critical business fu…☆10Jun 24, 2025Updated 8 months ago
- Cobalt Strike Beacon Object File (BOF) that obtain SYSTEM privilege with SeImpersonate privilege by passing a malicious IUnknwon object t…☆13Feb 4, 2024Updated 2 years ago
- ☆11Dec 10, 2023Updated 2 years ago
- OWASP Foundation web repository☆35Updated this week
- Sample SecOps scripts and Utilities☆12Jun 19, 2024Updated last year
- A CLI that scans for sensitive data in source code☆14Mar 22, 2023Updated 3 years ago
- ☆22Mar 24, 2025Updated 11 months ago
- Explore ThalesGroup's comprehensive framework for secure machine learning systems on this repository. Developed by Thales experts, this f…☆21Feb 1, 2026Updated last month
- Terraform modules for CloudSploit Scanner☆14Jul 12, 2022Updated 3 years ago
- SAMMY Open Source v2☆14Feb 6, 2025Updated last year
- ☆19Updated this week
- Welcome to the Very Vulnerable Lambda Application repository! This repository contains an intentionally vulnerable serverless applicatio…☆11Jul 22, 2024Updated last year
- Docker image that provides features similar to Burp Collaborator☆15Mar 6, 2021Updated 5 years ago
- ☆10Sep 12, 2024Updated last year
- The OWASP SAMM Website☆11Mar 7, 2026Updated 2 weeks ago
- ☆20Nov 6, 2023Updated 2 years ago
- Core model including reused documentation☆102Dec 16, 2025Updated 3 months ago
- 🏠 my dotfiles☆18Oct 18, 2024Updated last year
- Dataset fingerprinting for AIBOM☆15Updated this week
- A React Based Kubernetes YAML Manifest Sanity Checker☆11Mar 3, 2025Updated last year
- Configure an LDAPS Endpoint for Simple AD☆14Aug 29, 2017Updated 8 years ago
- ☆20Jan 6, 2025Updated last year
- ☆26Aug 31, 2023Updated 2 years ago
- This is a project to quickly accelerate the adoption of CloudFormation Guard syntax for use in AWS Config rules. The advantage of CloudF…☆13Dec 4, 2024Updated last year
- CVE-2022-0185 exploit rewritten with pipe primitive☆17Apr 5, 2022Updated 3 years ago
- RBAC in Kubernetes visualizer☆24Jun 11, 2019Updated 6 years ago
- ☆13Nov 5, 2024Updated last year
- A fork of APIviz with out of the box support for classes compiled with Java 8.☆10Apr 15, 2018Updated 7 years ago
- Offers Azure ARM Templates which can be used out of the box☆26Jun 14, 2018Updated 7 years ago
- Interactive CD dependency diagram☆29Feb 15, 2026Updated last month
- Slack alert bot for matching Github Audit Events☆10Nov 12, 2024Updated last year
- ☆13Dec 18, 2017Updated 8 years ago
- Small snippets and scripts which I use☆35Sep 17, 2020Updated 5 years ago
- Exploit script for the CFOR vulnerability using Github's GraphQL API☆23Aug 7, 2024Updated last year
- Abuse Zabbix API to obtain Remote Command Execution on hosts☆18Jun 4, 2021Updated 4 years ago