cisco-foundation-ai / cookbookLinks
☆43Updated last week
Alternatives and similar repositories for cookbook
Users that are interested in cookbook are comparing it to the libraries listed below
Sorting:
- ☆162Updated 4 months ago
- ATLAS tactics, techniques, and case studies data☆80Updated last week
- ☆56Updated 5 months ago
- This repository is for administrative documents for the CoSAI OASIS Open Project☆62Updated last week
- Zero Trust Agent☆31Updated last month
- Rapidly identify and mitigate container security vulnerabilities with generative AI.☆156Updated 2 weeks ago
- Test Software for the Characterization of AI Technologies☆261Updated this week
- Adversarial AI - Attacks, Mitigations, and Defense Strategies, published by Packt☆59Updated last year
- Project LLM Verification Standard☆50Updated this week
- Explore AI Supply Chain Risk with the AI Risk Database☆62Updated last year
- An AI-powered tool for discovering privilege escalation opportunities in AWS IAM configurations.☆116Updated 3 weeks ago
- Top 10 for Agentic AI (AI Agent Security) serves as the core for OWASP and CSA Red teaming work☆139Updated 4 months ago
- The project serves as a strategic advisory tool, capitalizing on the ZySec series of AI models to amplify the capabilities of security pr…☆63Updated last year
- Curated list of Open Source project focused on LLM security☆62Updated 11 months ago
- Repository for CoSAI Workstream 1, Software Supply Chain Security for AI Systems☆34Updated last week
- AI Security Shared Responsibility Model☆68Updated 2 weeks ago
- Repository for CoSAI workstream 3, AI Risk Governance☆16Updated 4 months ago
- ☆317Updated 3 weeks ago
- CALDERA plugin for adversary emulation of AI-enabled systems☆101Updated 2 years ago
- Supply chain security for ML☆194Updated this week
- Secure Jupyter Notebooks and Experimentation Environment☆84Updated 8 months ago
- ☆107Updated last year
- Working Group on Artificial Intelligence and Machine Learning (AI/ML) Security☆112Updated last month
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆58Updated 2 years ago
- ☆260Updated last month
- Practical examples of "Flawed Machine Learning Security" together with ML Security best practice across the end to end stages of the mach…☆118Updated 3 years ago
- Codebase of https://arxiv.org/abs/2410.14923☆51Updated 11 months ago
- Dropbox LLM Security research code and results☆235Updated last year
- ☆42Updated 9 months ago
- Red Teaming for AI and Cloud☆197Updated 4 months ago