cosai-oasis / secure-ai-toolingLinks
The CoSAI Risk Map is a framework for identifying, analyzing, and mitigating security risks in Artificial Intelligence systems. As traditional software security practices are not always sufficient for AI, this project provides a shared understanding and a common language for addressing the unique security challenges of the AI development lifecyc…
☆45Updated last month
Alternatives and similar repositories for secure-ai-tooling
Users that are interested in secure-ai-tooling are comparing it to the libraries listed below
Sorting:
- Vulnerability impact analyzer that reduces false positives in SCA tools by performing intelligent code analysis. Uses agentic AI with ope…☆62Updated 10 months ago
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆99Updated 2 months ago
- Red Teaming for AI and Cloud☆200Updated last month
- ☆62Updated 7 months ago
- ☆20Updated 9 months ago
- ☆38Updated last year
- Autoconfigured ELK Stack That Contains All EPSS and NVD CVE Data☆62Updated last week
- Maturity Model Collaborative project☆15Updated 2 years ago
- A simple web app to get the latest EPSS data for a CVE ID☆11Updated 3 weeks ago
- An AWS IAM Privilege Escalation Path Library☆88Updated 3 weeks ago
- A fun POC that is built to understand AI security agents.☆34Updated 2 months ago
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆101Updated 2 years ago
- ## Auto-archived due to inactivity. ## Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Securit…☆37Updated last year
- 🤖 A GitHub action that leverages fabric patterns through an agent-based approach☆32Updated last year
- Automation tool for Windows Deception Host Burn-In☆86Updated last year
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆68Updated 6 months ago
- ☆44Updated 4 months ago
- CALDERA plugin for adversary emulation of AI-enabled systems☆108Updated 2 years ago
- PEACH - a step-by-step framework for modeling and improving SaaS and PaaS tenant isolation, by managing the attack surface exposed by use…☆74Updated 3 years ago
- AI Security Shared Responsibility Model☆87Updated 3 months ago
- GCP GOAT is the vulnerable application for learn the GCP Security☆70Updated 7 months ago
- A full insecure kubernetes application for testing security tools☆91Updated 2 months ago
- A catalog of services that can be publicly exposed within different cloud providers.☆15Updated last year
- 📚A curated list of product security resources.☆22Updated 7 months ago
- ☆12Updated 4 years ago
- A tool for secrets management, encryption as a service, and privileged access management☆14Updated 5 months ago
- Curating Falco rules with MITRE ATT&CK Matrix☆86Updated last year
- An experimental project using LLM technology to generate security documentation for Open Source Software (OSS) projects☆34Updated 10 months ago
- Agentic Workflows Made Simple☆160Updated 10 months ago
- Cloud Offensive Breach and Risk Assessment (COBRA) Tool☆102Updated 7 months ago