cosai-oasis / ws2-defendersLinks
Repository for CoSAI workstream 2, Preparing Defenders for a Changing Cybersecurity Landscape
☆41Updated 3 weeks ago
Alternatives and similar repositories for ws2-defenders
Users that are interested in ws2-defenders are comparing it to the libraries listed below
Sorting:
- NOVA: The Prompt Pattern Matching☆61Updated 2 months ago
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆214Updated this week
- AI Security Shared Responsibility Model☆87Updated 3 months ago
- One Conference 2024☆111Updated last year
- OWASP Foundation Web Respository☆333Updated last week
- A curated list of LLM driven Cyber security Resources☆44Updated 2 months ago
- ☆38Updated last year
- ☆354Updated 3 months ago
- ☆282Updated 4 months ago
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆82Updated last year
- Curated list of Open Source project focused on LLM security☆69Updated last week
- Save toil in security operations with: Detection & Intelligence Analysis for New Alerts (D.I.A.N.A. )☆224Updated last year
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆99Updated 2 months ago
- 🛡️ SIGMA Detection Engineering Platform A comprehensive AI-powered detection engineering platform for security teams to explore MITRE AT…☆46Updated 6 months ago
- Code that implements Factor Analysis of Information Risk (FAIR) in combination with MITRE ATT&CK using Markov Chain Monte Carlo (via PyMC…☆43Updated 3 weeks ago
- OWASP Foundation web repository☆613Updated last week
- Repository for CoSAI workstream 3, AI Risk Governance☆20Updated last month
- ☆379Updated last year
- AWS audits, without screenshots☆27Updated 3 weeks ago
- ☆96Updated last month
- A starter pack of resources to help you get started in Detection Engineering.☆178Updated 4 months ago
- ☆63Updated 6 months ago
- ✨ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The …☆286Updated last year
- This repo contains IOC, malware and malware analysis associated with Public cloud☆249Updated last year
- Maturity models help integrate traditionally separate organizational functions, set process improvement goals and priorities, provide gui…☆260Updated 5 months ago
- A collection of companies that disclose adversary TTPs after they have been breached☆291Updated last month
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆103Updated 2 years ago
- Automating Security Detection Engineering, published by Packt☆65Updated last year
- Halberd : Multi-Cloud Agentic Attack Tool☆328Updated last week
- CALDERA plugin for adversary emulation of AI-enabled systems☆107Updated 2 years ago