Repository for CoSAI Workstream 4, Secure Design Patterns for Agentic Systems
☆90Mar 5, 2026Updated this week
Alternatives and similar repositories for ws4-secure-design-agentic-systems
Users that are interested in ws4-secure-design-agentic-systems are comparing it to the libraries listed below
Sorting:
- Repository for CoSAI Workstream 1, Software Supply Chain Security for AI Systems☆43Updated this week
- This repository is for administrative documents for the CoSAI OASIS Open Project☆74Feb 25, 2026Updated last week
- ☆13Jun 26, 2025Updated 8 months ago
- A Vulnerablity Radar That Runs With GIthub Actions☆45Updated this week
- Repository for CoSAI workstream 3, AI Risk Governance☆23Feb 18, 2026Updated 2 weeks ago
- A command-line interface tool for creating, managing, and verifying Content Provenance and Authenticity (C2PA) manifests for machine lear…☆21Mar 2, 2026Updated last week
- ☆15Jan 26, 2023Updated 3 years ago
- a prompt injection scanner for custom LLM applications☆21Feb 16, 2025Updated last year
- Basic notebook checks. Do they run? Do they contain lint?☆17Sep 26, 2025Updated 5 months ago
- excrypto offers specialized versions of the Go crypto, TLS, x509, and SSH packages designed for security research.☆15Feb 16, 2026Updated 3 weeks ago
- This extension provides a central location for viewing all GraphQL requests/responses within a Burp project. It provides a clean UI that …☆15Feb 24, 2022Updated 4 years ago
- VisAST: Building and visualising Abstract Syntax Trees for Python code.☆16Nov 9, 2023Updated 2 years ago
- Given a list of domains and known IP and buckets that are owned, which might be susceptible to domain hijacking?☆15Sep 20, 2024Updated last year
- ☆20Jan 5, 2024Updated 2 years ago
- Simple and sane compression wrapper library.☆19Oct 28, 2022Updated 3 years ago
- Mythic Scripting PyPi package - mythic☆28Oct 10, 2025Updated 4 months ago
- Minimalist Custom .NET Core Garbage Collector☆23Jun 15, 2020Updated 5 years ago
- ☆50May 12, 2021Updated 4 years ago
- Exactly what it sounds like, which is something rad☆22Oct 12, 2022Updated 3 years ago
- A tools for JavaScript Recon☆24Jul 25, 2020Updated 5 years ago
- The Seiso standard python cookiecutter template☆14Updated this week
- Remote code execution in Power Platform connectors via JSON deserialization☆23Mar 30, 2023Updated 2 years ago
- Adversarial Tokenization☆35Nov 21, 2025Updated 3 months ago
- ☆56Nov 18, 2025Updated 3 months ago
- A small example of loading BOFs in Python with pure reflection☆19Jan 26, 2023Updated 3 years ago
- Network for procedural editing of text with LLMs☆23Dec 6, 2025Updated 3 months ago
- Automation Engine using the Covenant API and lua scripting☆24Dec 8, 2022Updated 3 years ago
- Using Microsoft 365 App Passwords for persistence☆23Sep 2, 2020Updated 5 years ago
- recon.cloud is website that scans AWS, Azure and GCP public cloud footprint this GO tool only utilize its API for getting result to termi…☆25Feb 11, 2023Updated 3 years ago
- POC code to crash Windows Event Logger Service☆27Oct 16, 2020Updated 5 years ago
- ☆43Aug 27, 2025Updated 6 months ago
- Red Team Automation tool powered by go and terraform☆33May 26, 2021Updated 4 years ago
- Red AI Archive: Jeff Sims - A curated collection of work in AI safety, cybersecurity data science, and AI red teaming – my own research a…☆26Apr 1, 2025Updated 11 months ago
- Tools for taking over Crestron Windows CE devices☆36Jul 11, 2022Updated 3 years ago
- A powerful subdomain enumeration tool that aggregates data from multiple sources to create comprehensive lists of root subdomains.☆46Dec 19, 2025Updated 2 months ago
- Some Hashcat Rules for 2020 and beyond. Contributions encouraged!☆26May 26, 2022Updated 3 years ago
- Library of traffic redirectors☆26Apr 7, 2020Updated 5 years ago
- A Swift port of some of the original PersistentJXA projects by D00MFist. Original PersistentJXA repo: https://github.com/D00MFist/Persist…☆34Apr 15, 2021Updated 4 years ago
- A red teaming attack paradigm against AI Agents☆32Mar 9, 2025Updated last year