PacktPublishing / Adversarial-AI---Attacks-Mitigations-and-Defense-Strategies
Adversarial AI - Attacks, Mitigations, and Defense Strategies, published by Packt
☆37Updated 9 months ago
Alternatives and similar repositories for Adversarial-AI---Attacks-Mitigations-and-Defense-Strategies
Users that are interested in Adversarial-AI---Attacks-Mitigations-and-Defense-Strategies are comparing it to the libraries listed below
Sorting:
- ☆36Updated 4 months ago
- OWASP Machine Learning Security Top 10 Project☆85Updated 3 months ago
- ☆39Updated 5 months ago
- Reference notes for Attacking and Defending Generative AI presentation☆61Updated 9 months ago
- An experimental project using LLM technology to generate security documentation for Open Source Software (OSS) projects☆28Updated 2 months ago
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆76Updated last week
- LLM Testing Findings Templates☆72Updated last year
- Explore AI Supply Chain Risk with the AI Risk Database☆56Updated last year
- NOVA: The Prompt Pattern Matching☆80Updated 2 weeks ago
- Payloads for Attacking Large Language Models☆83Updated 10 months ago
- ATLAS tactics, techniques, and case studies data☆71Updated 3 weeks ago
- An AI-powered tool for discovering privilege escalation opportunities in AWS IAM configurations.☆110Updated 7 months ago
- ☆40Updated last week
- Threat Hunting with Elastic Stack, Published by Packt☆39Updated 2 years ago
- Automating Security Detection Engineering, published by Packt☆54Updated 7 months ago
- Cybersecurity Architects Handbook, published by Packt☆21Updated last year
- CALDERA plugin for adversary emulation of AI-enabled systems☆96Updated last year
- This repository contains resources and materials for the "Using Retrieval Augmented Generation (RAG), Langchain, and LLMs for Cybersecuri…☆51Updated last month
- Practical Threat Detection Engineering, Published by Packt☆68Updated last year
- ☆39Updated last week
- ☆104Updated 11 months ago
- ☆243Updated 4 months ago
- ☆21Updated 3 weeks ago
- Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogue…☆62Updated 3 weeks ago
- Purple Team Strategies, Published by Packt☆12Updated 2 years ago
- 🤖 A GitHub action that leverages fabric patterns through an agent-based approach☆26Updated 4 months ago
- Vulnerability impact analyzer that reduces false positives in SCA tools by performing intelligent code analysis. Uses agentic AI with ope…☆54Updated 2 months ago
- Delving into the Realm of LLM Security: An Exploration of Offensive and Defensive Tools, Unveiling Their Present Capabilities.☆161Updated last year
- Awesome products for securing AI systems includes open source and commercial options and an infographic licensed CC-BY-SA-4.0.☆62Updated 11 months ago
- A LLM explicitly designed for getting hacked☆149Updated last year