cybershujin / AI-for-CybersecurityLinks
☆51Updated 11 months ago
Alternatives and similar repositories for AI-for-Cybersecurity
Users that are interested in AI-for-Cybersecurity are comparing it to the libraries listed below
Sorting:
- ☆273Updated 2 months ago
- ☆331Updated 2 months ago
- NOVA: The Prompt Pattern Matching☆47Updated last month
- ☆43Updated 11 months ago
- CALDERA plugin for adversary emulation of AI-enabled systems☆103Updated 2 years ago
- Delving into the Realm of LLM Security: An Exploration of Offensive and Defensive Tools, Unveiling Their Present Capabilities.☆166Updated 2 years ago
- A curated list of LLM driven Cyber security Resources☆38Updated last month
- ☆55Updated 6 months ago
- ATLAS tactics, techniques, and case studies data☆87Updated 2 weeks ago
- A collection of agents that use Large Language Models (LLMs) to perform tasks common on our day to day jobs in cyber security.☆213Updated last year
- Code Repository for: AIRTBench: Measuring Autonomous AI Red Teaming Capabilities in Language Models☆90Updated this week
- Awesome products for securing AI systems includes open source and commercial options and an infographic licensed CC-BY-SA-4.0.☆74Updated last year
- Collection of Jupyter Notebooks by @fr0gger_☆185Updated last month
- ☆116Updated 5 months ago
- OWASP Foundation Web Respository☆330Updated this week
- Curated list of Open Source project focused on LLM security☆66Updated last year
- Curated resources, research, and tools for securing AI systems☆182Updated last week
- The project serves as a strategic advisory tool, capitalizing on the ZySec series of AI models to amplify the capabilities of security pr…☆64Updated last year
- A collection of awesome resources related AI security☆356Updated 2 months ago
- ☆38Updated 10 months ago
- Payloads for Attacking Large Language Models☆104Updated 5 months ago
- Extracts IoCs, TTPs and the relationships between them. Outputs a STIX 2.1 bundle.☆76Updated last week
- One Conference 2024☆111Updated last year
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆101Updated last year
- A collection of companies that disclose adversary TTPs after they have been breached☆290Updated last week
- Save toil in security operations with: Detection & Intelligence Analysis for New Alerts (D.I.A.N.A. )☆221Updated last year
- Adversarial AI - Attacks, Mitigations, and Defense Strategies, published by Packt☆67Updated last year
- AI Security Shared Responsibility Model☆84Updated last month
- Knowledge base on cybercriminal concealment techniques☆80Updated 6 months ago
- Reference notes for Attacking and Defending Generative AI presentation☆67Updated last year