TalEliyahu / Awesome-AI-SecurityLinks
Curated resources, research, and tools for securing AI systems
☆33Updated this week
Alternatives and similar repositories for Awesome-AI-Security
Users that are interested in Awesome-AI-Security are comparing it to the libraries listed below
Sorting:
- TTPMapper is an AI-driven threat intelligence parser that converts unstructured reports whether from web URLs or PDF files into structure…☆44Updated 2 months ago
- NOVA: The Prompt Pattern Matching☆161Updated last month
- Framework for Monitoring File Ingestion Source for Yara Matches☆48Updated 5 months ago
- ☆17Updated 4 months ago
- A knowledge source about TTPs used to target GenAI-based systems, copilots and agents☆116Updated last month
- Scripts for importing threat feeds and CTI articles, blogs, and reports into MISP.☆17Updated 2 months ago
- An index of publicly available and open-source threat detection rulesets.☆122Updated 4 months ago
- Code Repository for: AIRTBench: Measuring Autonomous AI Red Teaming Capabilities in Language Models☆74Updated this week
- Automation tool for Windows Deception Host Burn-In☆86Updated 8 months ago
- Collection of Docker honeypot logs from 2021 - 2024☆36Updated 10 months ago
- A comprehensive knowledge base for security professionals to keep track of and build defenses against API attack techniques.☆43Updated 11 months ago
- An archive of 0day.today exploits☆155Updated last month
- Cyber threat intelligence tool suite.☆41Updated 4 months ago
- Mapping of open-source detection rules and atomic tests.☆175Updated 7 months ago
- Protection against HTML smuggling attacks.☆97Updated last month
- Repo for experimenting and testing MCP server builds for CTI-related research.☆27Updated 3 months ago
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆29Updated last year
- A curated list of awesome resources related to enhancing your enterprise Email Security☆52Updated 5 months ago
- Online resources related to Detection Engineering. Detection rules, detection logic, attack samples, detection tests and emulation tools…☆113Updated last month
- Living Off Security Tools☆45Updated 10 months ago
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆71Updated last year
- The EPSS Calculator is a user-friendly web application that calculates the EPSS (Exploit Prediction Scoring System) score based on a prov…☆14Updated 9 months ago
- ☆74Updated 5 months ago
- ☆113Updated 3 months ago
- ☆53Updated 2 weeks ago
- Turn any blog into structured threat intelligence.☆35Updated this week
- Jupyter Univere is a search engine for all infosec jupyter notebooks☆28Updated 5 months ago
- Raw data from Threat Intelligence Reports with automatic reports collection and keyword search across thousands of reports☆131Updated this week
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆56Updated this week
- A Kubernetes Forensic Collection Framework for Azure Kubernetes Service☆34Updated last week