disesdi / mlsecops_referencesLinks
☆138Updated last month
Alternatives and similar repositories for mlsecops_references
Users that are interested in mlsecops_references are comparing it to the libraries listed below
Sorting:
- OWASP Foundation Web Respository☆282Updated 3 weeks ago
- OWASP Foundation web repository☆223Updated this week
- ☆50Updated 2 months ago
- Explore AI Supply Chain Risk with the AI Risk Database☆58Updated last year
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆89Updated 2 months ago
- ATLAS tactics, techniques, and case studies data☆76Updated 2 months ago
- Top 10 for Agentic AI (AI Agent Security) serves as the core for OWASP and CSA Red teaming work☆119Updated last month
- OWASP Foundation web repository☆27Updated last week
- Curated list of Open Source project focused on LLM security☆50Updated 8 months ago
- Test Software for the Characterization of AI Technologies☆260Updated this week
- OWASP Machine Learning Security Top 10 Project☆85Updated 5 months ago
- ☆37Updated 6 months ago
- This repository contains resources and materials for the "AI Agents and Retrieval Augmented Generation (RAG) for Cybersecurity Operations…☆60Updated 3 weeks ago
- OCSF Documentation☆132Updated last month
- Project LLM Verification Standard☆44Updated 2 months ago
- Working Group on Artificial Intelligence and Machine Learning (AI/ML) Security☆89Updated last week
- An AI-powered threat modeling tool that leverages OpenAI's GPT models to generate threat models for a given application based on the STRI…☆777Updated last month
- One Conference 2024☆111Updated 9 months ago
- Elevation of MLsec: a threat-modeling card game for machine learning systems☆25Updated 6 months ago
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆58Updated last year
- This GitHub page shows the CISO Tradecraft Podcast broken down by Topic☆129Updated last week
- ☆62Updated last year
- An AI-powered tool for discovering privilege escalation opportunities in AWS IAM configurations.☆113Updated this week
- ☆254Updated 6 months ago
- ☆370Updated last year
- Rapidly identify and mitigate container security vulnerabilities with generative AI.☆147Updated this week
- Adversarial AI - Attacks, Mitigations, and Defense Strategies, published by Packt☆49Updated 11 months ago
- ☆41Updated 7 months ago
- Practical examples of "Flawed Machine Learning Security" together with ML Security best practice across the end to end stages of the mach…☆112Updated 3 years ago
- ☆279Updated 2 weeks ago