The CoSAI Risk Map is a framework for identifying, analyzing, and mitigating security risks in Artificial Intelligence systems. As traditional software security practices are not always sufficient for AI, this project provides a shared understanding and a common language for addressing the unique security challenges of the AI development lifecyc…
☆70Apr 10, 2026Updated last week
Alternatives and similar repositories for secure-ai-tooling
Users that are interested in secure-ai-tooling are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Repository for CoSAI workstream 3, AI Risk Governance☆25Feb 18, 2026Updated 2 months ago
- Repository for CoSAI workstream 2, Preparing Defenders for a Changing Cybersecurity Landscape☆51Mar 11, 2026Updated last month
- Interactive CRQ Monte Carlo simulation tool for quantifying cybersecurity risk using FAIR methodology. Built for EU SMBs, vCISOs, and sec…☆30Dec 5, 2025Updated 4 months ago
- This repository contains a Python client for interfacing with the [crt.sh](https://crt.sh/) website, allowing users to retrieve informati…☆18Sep 1, 2024Updated last year
- IEC104 Client for Metasploit☆11Aug 6, 2018Updated 7 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Maturity Model Collaborative project☆15Feb 27, 2023Updated 3 years ago
- This repository is dedicated to providing comprehensive mappings of the OWASP Top 10 vulnerabilities for Large Language Models (LLMs) to …☆39Feb 15, 2024Updated 2 years ago
- nessus plugin for metasploit to connect to a nessus server☆23May 1, 2013Updated 12 years ago
- Fork Threat Modeling Platform - Community☆28Oct 10, 2025Updated 6 months ago
- A security-first linter for code that shouldn't need linting☆18Sep 12, 2023Updated 2 years ago
- KEV EPSS Data☆33Updated this week
- Source code of "TRAP: Targeted Random Adversarial Prompt Honeypot for Black-Box Identification", ACL2024 (findings)☆14Nov 20, 2024Updated last year
- MCP Server Security Standard (MSSS): an open, testable security control standard for certifying MCP servers, with levels, evidence requir…☆72Mar 12, 2026Updated last month
- Repo for the oreilly course about building agents with gpt assistants api☆18Oct 28, 2025Updated 5 months ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Working Group on Artificial Intelligence and Machine Learning (AI/ML) Security☆162Dec 19, 2025Updated 3 months ago
- A toolkit for optimizing machine learning models for practical applications☆31Mar 6, 2025Updated last year
- Proof of concept code for DeepSteal (SP'22) Machine Learning model extraction (weight stealing) with memory side channel☆14Jun 22, 2023Updated 2 years ago
- ☆24Mar 20, 2025Updated last year
- All about llm-agents security,attack,vulnerabilities and how to do them for cybersecurity.☆47Apr 8, 2026Updated last week
- Outputs vs. outcomes: what's the different and why does it matter?☆16Apr 14, 2025Updated last year
- OASIS TC Open Repository: A GitHub repository for management of non-normative information about the work of the CSAF Technical Committee,…☆21Mar 13, 2026Updated last month
- OASIS TC Open Repository: CSAF Parser tool for parsing and checking the syntax of the Common Vulnerability Reporting Framework (CVRF) con…☆24Jul 14, 2022Updated 3 years ago
- Curated resources, research, and tools for securing AI systems☆673Apr 10, 2026Updated last week
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A production-ready iOS automation MCP server built with FastMCP 2.0, featuring clean modular architecture with complete platform segregat…☆31Jul 26, 2025Updated 8 months ago
- Script to mass deauthenticate multiple wireless clients.☆12Jan 1, 2017Updated 9 years ago
- This project aims to standardize the representation and management of EOL and EOS product information across the industry.☆30Mar 4, 2024Updated 2 years ago
- Automatically attack all file shares within AD network environment. Exploiting weak permissions.☆17Aug 2, 2019Updated 6 years ago
- Consolidated demo and source links from Bryant Zadegan and Ryan Lester's Black Hat / DEF CON talk "Abusing Bleeding Edge Web Standards fo…☆11Aug 19, 2017Updated 8 years ago
- (Unofficial) Python API for cybercrime-tracker.net☆38Jan 20, 2018Updated 8 years ago
- OWASP Foundation web repository☆65Apr 10, 2026Updated last week
- CVRF parsing/validation utility☆32Jun 1, 2016Updated 9 years ago
- Cracow's roads graph analysis and exploration. Data exploration course on AGH UST Data Science Ms☆20Jun 18, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- An AD CS toolkit for AD Admins, Defensive Security Professionals, and Filthy Red Teamers☆43Apr 7, 2026Updated last week
- ☆10Jun 30, 2016Updated 9 years ago
- ☆18Apr 16, 2015Updated 11 years ago
- Code samples from Practical Binary Analysis☆25May 23, 2020Updated 5 years ago
- An extended version of SecureBERT, trained on top of both base and large version of RoBERTa using 10 GB cybersecurity-related data☆32Jan 26, 2024Updated 2 years ago
- ☆10Jul 6, 2016Updated 9 years ago
- Custom Fortify SCA rules to detect common JSSE certification validation flaws☆11Nov 18, 2015Updated 10 years ago