Repository for CoSAI workstream 2, Preparing Defenders for a Changing Cybersecurity Landscape
☆56Apr 30, 2026Updated last week
Alternatives and similar repositories for ws2-defenders
Users that are interested in ws2-defenders are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Repository for CoSAI workstream 3, AI Risk Governance☆31Feb 18, 2026Updated 2 months ago
- Repository for CoSAI Workstream 1, Software Supply Chain Security for AI Systems☆48Apr 27, 2026Updated last week
- This repository is for administrative documents for the CoSAI OASIS Open Project☆82Apr 29, 2026Updated last week
- The CoSAI Risk Map is a framework for identifying, analyzing, and mitigating security risks in Artificial Intelligence systems. As tradit…☆79Updated this week
- Working Group on Artificial Intelligence and Machine Learning (AI/ML) Security☆168May 1, 2026Updated last week
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆17Mar 10, 2025Updated last year
- CDS Threat Modeling Tool MVP☆15Updated this week
- Repository for CoSAI Workstream 4, Secure Design Patterns for Agentic Systems☆103Updated this week
- An unofficial IntelliJ workaround for Apple Silicon-based macs.☆19Dec 9, 2020Updated 5 years ago
- Repository for the work of the CoSAI Technical Steering Committee (TSC)☆21May 3, 2026Updated last week
- Security gateway for AI agents - credential-isolated API proxying and policy-gated remote execution (conclaves). Reduce the blast radius!☆131Mar 11, 2026Updated last month
- HackingResources for learning in 2020☆13Feb 15, 2021Updated 5 years ago
- Kubernetes, Clusters and Dockers Enumeration in GCP and AWS environments☆12Nov 23, 2023Updated 2 years ago
- Security proxy for AI agents. Scans every message for prompt injection, PII, and secrets. Defense-in-depth: Go proxy + iptables firewall …☆127Mar 26, 2026Updated last month
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A software tool kit to help identify quickly what's inside your binary files.☆14Dec 9, 2024Updated last year
- Comunidade Brasileira de Cibersegurança☆25Oct 6, 2025Updated 7 months ago
- This solution will help you automate user group assignment to permission sets in AWS IAM Identity center for accessing any or all AWS acc…☆25Mar 24, 2025Updated last year
- ☆25Jan 6, 2023Updated 3 years ago
- Point of Concept: To help to automate the collection of evidence for SOC 2 Audits and etc.☆11May 13, 2024Updated last year
- An open-source knowledge base of defensive countermeasures to protect AI/ML systems. Features interactive views and maps defenses to know…☆152Apr 27, 2026Updated last week
- EnumDNS is a modular DNS reconnaissance tool capable of resolving hosts from various sources, including wordlists, BloodHound files, and …☆21Mar 9, 2026Updated 2 months ago
- Beispiel Projekt des Scoring Bounded Contexts meiner DDD Schulung☆13Sep 4, 2025Updated 8 months ago
- An AI-driven vulnerability scanner that uses Nmap to discover open services on a user-supplied IP, matches each service to relevant CVEs …☆46Jun 1, 2025Updated 11 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- OPA Authzed experiments☆17Mar 11, 2024Updated 2 years ago
- ATHF is a framework for agentic threat hunting - building systems that can remember, learn, and act with increasing autonomy.☆261Apr 30, 2026Updated last week
- ☆12May 13, 2025Updated 11 months ago
- Akka.Peristence implementation for the EventStore database☆17Mar 17, 2026Updated last month
- This repo contains the codes for the experiments of the paper "AutoPenBench: Benchmarking Generative Agents for Penetration Testing".☆16Oct 28, 2025Updated 6 months ago
- Bro Live! A Bro training/learning environment.☆14Jul 21, 2015Updated 10 years ago
- Django middleware and signals for handling security events☆14Apr 14, 2021Updated 5 years ago
- A basic example of how to use Cortana in a Windows 10 Hosted Application☆13Jun 24, 2015Updated 10 years ago
- Drop-in OIDC & Google A2A auth + Weaviate memory for Ollama, vLLM and any local LLM server.☆18Jan 17, 2026Updated 3 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- This is a smart contract tutorial, this tutorial guide you how to compile & deploy a mintable ERC20 token smart contract using client sid…☆13Oct 6, 2018Updated 7 years ago
- AntennaCalculator: An Open-Source Antenna Design Tool☆21Feb 17, 2026Updated 2 months ago
- Arduino code for a cell phone emf detection object. Making Things Interactive, CMU 2014☆13Sep 16, 2014Updated 11 years ago
- ☆62Apr 27, 2026Updated last week
- [42-b3yond-6ug] This repository hosts BugBuster, our team’s submission to the AI Cyber Challenge Final Competition.☆30Aug 19, 2025Updated 8 months ago
- My Ubuntu 22.04 VPS general configs and scripts I use for bug bounty☆24Apr 15, 2026Updated 3 weeks ago
- Table Top Exercise (TTX) for Computer Security Incident Response (CSIRT) teams. The templatized artifacts provided will hopefully help te…☆44Sep 8, 2020Updated 5 years ago