avogabos / ai_security_starterkit
☆69Updated this week
Related projects ⓘ
Alternatives and complementary repositories for ai_security_starterkit
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆44Updated 2 weeks ago
- An LLM and OCR based Indicator of Compromise Extraction Tool☆30Updated 7 months ago
- A comprehensive knowledge base for security professionals to keep track of and build defenses against API attack techniques.☆39Updated last month
- Simple Workspace Attack Tool (SWAT) is a tool for simulating malicious behavior against Google Workspace in reference to the MITRE ATT&CK…☆161Updated last month
- ForgeArmory provides TTPs that can be used with the TTPForge (https://github.com/facebookincubator/ttpforge).☆90Updated last month
- ☆98Updated 5 months ago
- CALDERA plugin for adversary emulation of AI-enabled systems☆85Updated last year
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.☆50Updated 2 weeks ago
- Intel Retrieval Augmented Generation (RAG) Utilities☆87Updated 9 months ago
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆67Updated 6 months ago
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆61Updated this week
- HASH (HTTP Agnostic Software Honeypot)☆128Updated 6 months ago
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆82Updated 9 months ago
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆74Updated 10 months ago
- Anvilogic Forge☆86Updated this week
- Collection of Docker honeypot logs from 2021 - 2024☆35Updated last month
- ☆82Updated 2 months ago
- This is a RSS feed collection for all the InfoSec Content Creators☆30Updated last year
- Signature based honeypot detector tool written in Golang☆84Updated 5 months ago
- Lightweight Python-Based Malware Analysis Pipeline☆29Updated 3 weeks ago
- ☆109Updated last year
- Vulnerability Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streaml…☆128Updated this week
- LLM Testing Findings Templates☆65Updated 8 months ago
- This is a collection of threat detection rules / rules engines that I have come across.☆274Updated 6 months ago
- A collection of companies that disclose adversary TTPs after they have been breached☆239Updated 6 months ago
- Save toil in security operations with: Detection & Intelligence Analysis for New Alerts (D.I.A.N.A. )☆148Updated 2 months ago
- This tool analyzes a given Gitlab repository and searches for dangling or force-pushed commits containing potential secret or interesting…☆39Updated 2 months ago
- Create notes during a security code review in VSCode 📝 Import your favorite SAST tool findings 🛠️ and collaborate with others 🤝☆129Updated last year
- Repository that contains a set of purposefully erroneous Yara rules.☆48Updated 9 months ago
- ☆115Updated last year