disesdi / mlsecops_references
☆22Updated last year
Alternatives and similar repositories for mlsecops_references:
Users that are interested in mlsecops_references are comparing it to the libraries listed below
- Explore AI Supply Chain Risk with the AI Risk Database☆51Updated 9 months ago
- Maturity Model Collaborative project☆14Updated last year
- A Golang library for interacting with the EPSS (Exploit Prediction Scoring System).☆27Updated this week
- Secure Jupyter Notebooks and Experimentation Environment☆65Updated 2 weeks ago
- A meta-database collecting resources that compile lists of breaches☆18Updated 3 months ago
- ☆12Updated 3 months ago
- ☆10Updated 2 years ago
- ☆32Updated 6 months ago
- ATLAS tactics, techniques, and case studies data☆56Updated 4 months ago
- The Privacy Adversarial Framework (PAF) is a knowledge base of privacy-focused adversarial tactics and techniques. PAF is heavily inspire…☆56Updated last year
- An interactive CLI application for interacting with authenticated Jupyter instances.☆50Updated 11 months ago
- LLM Testing Findings Templates☆66Updated last year
- A security tool designed to help review merged code changes to open source maintained repositories via LLM assisted review to safeguard a…☆30Updated 4 months ago
- Repository to archive GCP Documentation for local use☆15Updated last week
- ☆14Updated 6 months ago
- Defending IaaS with ATT&CK is a project to create a collection of ATT&CK techniques relevant to a Linux IaaS environment, as well as a me…☆13Updated 11 months ago
- DEF CON 31 AI Village - LLMs: Loose Lips Multipliers☆10Updated last year
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆61Updated 7 months ago
- A GitHub Actions Supply Chain CTF / Goat☆17Updated 2 weeks ago
- InfoSec OpenAI Examples☆19Updated last year
- Vulnerable by Design AWS Cloud Development Kit (CDK) Infrastructure☆46Updated last year
- A few quick recipes for those that do not have much time during the day☆22Updated 3 months ago
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆11Updated 2 years ago
- Markdown Version of the DHS/CISA Secure Software Development Self Attestation Form.☆21Updated last year
- ☆28Updated 3 months ago
- Open YARA scan- and search engine☆19Updated 2 months ago
- Run Capture the Flags and Security Trainings with OWASP WrongSecrets☆43Updated this week
- ☆31Updated 3 months ago
- A set of AWS resources for testing the Log4Shell vulnerability, deployable with terraform☆12Updated 3 years ago
- Simple tool to identify and remediate the use of the AWS EC2 IMDSv1.☆16Updated 3 years ago