disesdi / mlsecops_references
☆22Updated 9 months ago
Related projects ⓘ
Alternatives and complementary repositories for mlsecops_references
- A Golang library for interacting with the EPSS (Exploit Prediction Scoring System).☆27Updated 8 months ago
- Maturity Model Collaborative project☆13Updated last year
- Secure Jupyter Notebooks and Experimentation Environment☆56Updated last month
- LLM Testing Findings Templates☆65Updated 9 months ago
- Salesforce Policy Deviation Checker☆30Updated 4 years ago
- Defending IaaS with ATT&CK is a project to create a collection of ATT&CK techniques relevant to a Linux IaaS environment, as well as a me…☆13Updated 8 months ago
- An interactive CLI application for interacting with authenticated Jupyter instances.☆48Updated 8 months ago
- ☆14Updated last year
- A security tool designed to help review merged code changes to open source maintained repositories via LLM assisted review to safeguard a…☆28Updated last month
- Stupid Simple Detection Testing☆11Updated 8 months ago
- Explore AI Supply Chain Risk with the AI Risk Database☆50Updated 6 months ago
- ☆37Updated 2 months ago
- InfoSec OpenAI Examples☆19Updated 11 months ago
- An LLM and OCR based Indicator of Compromise Extraction Tool☆31Updated 7 months ago
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆55Updated 4 months ago
- A PoC to Simulate Ransomware Attack on AWS Environment☆27Updated last month
- ☆14Updated 3 months ago
- This repository contains the research and components of our research into using Sigma for AWS Incident Response.☆25Updated last year
- ☆37Updated 7 months ago
- ☆18Updated 3 weeks ago
- Knowledge Report Alert & Normalization Generator☆27Updated 8 months ago
- Tools related to work with Attack Flow (https://github.com/center-for-threat-informed-defense/attack-flow)☆43Updated 2 years ago
- A few quick recipes for those that do not have much time during the day☆21Updated 3 weeks ago
- A meta-database collecting resources that compile lists of breaches☆18Updated 2 weeks ago
- AI featured threat modeling and security review action☆40Updated this week
- Example repository for GitHub Actions Time of Check to Time of Use (TOCTOU vulnerabilities)☆22Updated 4 months ago
- Repository to archive GCP Documentation for local use☆13Updated 2 weeks ago
- Markdown Version of the DHS/CISA Secure Software Development Self Attestation Form.☆21Updated last year