bayegaspard / GoldMineLinks
AI-powered tool designed to help security professionals detect vulnerabilities at machine speed and extract insights from extensive bug bounty reports. By leveraging Generative AI and Retrieval-Augmented Generation (RAG), GoldMine supercharges red-teaming operations and keeps you ahead in the cyber battle.
☆17Updated last year
Alternatives and similar repositories for GoldMine
Users that are interested in GoldMine are comparing it to the libraries listed below
Sorting:
- Delving into the Realm of LLM Security: An Exploration of Offensive and Defensive Tools, Unveiling Their Present Capabilities.☆164Updated last year
- ☆303Updated last month
- Code Repository for: AIRTBench: Measuring Autonomous AI Red Teaming Capabilities in Language Models☆75Updated this week
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆90Updated 3 months ago
- AIGoat: A deliberately Vulnerable AI Infrastructure. Learn AI security through solving our challenges.☆248Updated 4 months ago
- ☆259Updated this week
- Payloads for AI Red Teaming and beyond☆257Updated last month
- A LLM explicitly designed for getting hacked☆158Updated 2 years ago
- NOVA: The Prompt Pattern Matching☆164Updated last month
- Learn AI security through a series of vulnerable LLM CTF challenges. No sign ups, no cloud fees, run everything locally on your system.☆297Updated last year
- A curated list of MLSecOps tools, articles and other resources on security applied to Machine Learning and MLOps systems.☆365Updated last month
- Curated list of Open Source project focused on LLM security☆62Updated 9 months ago
- ☆42Updated 8 months ago
- ☆38Updated 8 months ago
- ATLAS tactics, techniques, and case studies data☆77Updated 2 weeks ago
- ☆54Updated 3 months ago
- An experimental project using LLM technology to generate security documentation for Open Source Software (OSS) projects☆33Updated 6 months ago
- ☆65Updated this week
- A research platform to develop automated security policies using quantitative methods, e.g., optimal control, computational game theory, …☆130Updated last month
- source code for the offsecml framework☆41Updated last year
- A productionized greedy coordinate gradient (GCG) attack tool for large language models (LLMs)☆131Updated 8 months ago
- Payloads for Attacking Large Language Models☆96Updated 2 months ago
- ☆11Updated last year
- This repository contains resources and materials for the "AI Agents and Retrieval Augmented Generation (RAG) for Cybersecurity Operations…☆82Updated last week
- A collection of awesome resources related AI security☆294Updated 2 weeks ago
- Vulnerability impact analyzer that reduces false positives in SCA tools by performing intelligent code analysis. Uses agentic AI with ope…☆57Updated 6 months ago
- CALDERA plugin for adversary emulation of AI-enabled systems☆99Updated 2 years ago
- A research project to add some brrrrrr to Burp☆187Updated 6 months ago
- A curated list of LLM driven Cyber security Resources☆35Updated 3 months ago
- ☆61Updated 2 months ago