disesdi / mlsecops_references
☆21Updated last week
Alternatives and similar repositories for mlsecops_references:
Users that are interested in mlsecops_references are comparing it to the libraries listed below
- A Golang library for interacting with the EPSS (Exploit Prediction Scoring System).☆28Updated 2 months ago
- ☆10Updated 2 years ago
- Maturity Model Collaborative project☆15Updated 2 years ago
- Explore AI Supply Chain Risk with the AI Risk Database☆53Updated 11 months ago
- Secure Jupyter Notebooks and Experimentation Environment☆74Updated 2 months ago
- ATHI — An AI Threat Modeling Framework for Policymakers☆51Updated last year
- Data Scientists Go To Jupyter☆62Updated last month
- A few quick recipes for those that do not have much time during the day☆22Updated 5 months ago
- Simulates a compromise in a cloud and container environment☆32Updated 4 months ago
- A fun POC that is built to understand AI security agents.☆30Updated 4 months ago
- ☆28Updated 3 months ago
- DEF CON 31 AI Village - LLMs: Loose Lips Multipliers☆10Updated last year
- An LLM and OCR based Indicator of Compromise Extraction Tool☆33Updated 4 months ago
- This repository contains generated contextual data utilized by pyattck.☆19Updated last month
- Markdown Version of the DHS/CISA Secure Software Development Self Attestation Form.☆21Updated last year
- A meta-database collecting resources that compile lists of breaches☆18Updated 5 months ago
- ATLAS tactics, techniques, and case studies data☆63Updated last month
- Automate vulnerability triage which prioritizes remediation over discovery☆16Updated this week
- The Privacy Adversarial Framework (PAF) is a knowledge base of privacy-focused adversarial tactics and techniques. PAF is heavily inspire…☆56Updated last year
- A security-first linter for code that shouldn't need linting☆16Updated last year
- Defending IaaS with ATT&CK is a project to create a collection of ATT&CK techniques relevant to a Linux IaaS environment, as well as a me…☆14Updated last year
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆62Updated 9 months ago
- DNS Dashboard for hunting and identifying beaconing☆15Updated 4 years ago
- Salesforce Policy Deviation Checker☆30Updated 4 years ago
- InfoSec OpenAI Examples☆19Updated last year
- Autoconfigured ELK Stack That Contains All EPSS and NVD CVE Data☆49Updated 9 months ago
- ☆12Updated 5 months ago
- A PoC to Simulate Ransomware Attack on AWS Environment☆31Updated 6 months ago
- A collection of prompt injection mitigation techniques.☆22Updated last year
- LLM Testing Findings Templates☆70Updated last year