jpyoda / mitre-framework-llm
Welcome to MitreMesh. Where MITRE's framework meets dynamic scenario generation, creating a comprehensive net of incident response tests for cybersecurity professionals.
☆16Updated last year
Alternatives and similar repositories for mitre-framework-llm:
Users that are interested in mitre-framework-llm are comparing it to the libraries listed below
- Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogue…☆54Updated this week
- ☆102Updated 9 months ago
- ☆37Updated 2 months ago
- A collection of agents that use Large Language Models (LLMs) to perform tasks common on our day to day jobs in cyber security.☆86Updated 9 months ago
- ATLAS tactics, techniques, and case studies data☆57Updated 5 months ago
- Explore AI Supply Chain Risk with the AI Risk Database☆52Updated 9 months ago
- CALDERA plugin for adversary emulation of AI-enabled systems☆93Updated last year
- An AI-powered tool for discovering privilege escalation opportunities in AWS IAM configurations.☆106Updated 5 months ago
- 🚨ATTENTION🚨 The CVE mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here as…☆235Updated 11 months ago
- SMET : Semantic Mapping of CVE to ATT&CK and its Application to Cybersecurity☆44Updated 5 months ago
- AWSATT&CK adds MITRE ATT&CK context and additional logging capabilities to Rhino Security Labs's open-source AWS exploitation framework, …☆45Updated 3 years ago
- Public static website for the D3FEND project. For the D3FEND ontology repo see: https://github.com/d3fend/d3fend-ontology☆76Updated this week
- AI/ML applications have unique security threats. Project GuardRail is a set of security and privacy requirements that AI/ML applications …☆26Updated 2 months ago
- Intelligence around common attacker behaviors (MITRE ATT&CK TTPs), in the form of ATT&CK Navigator "layer" json files.☆34Updated 2 years ago
- ☆11Updated last year
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆52Updated 2 years ago
- pretrained BERT model for cyber security text, learned CyberSecurity Knowledge☆174Updated last year
- Sensor Mappings to ATT&CK is a collection of resources to assist cyber defenders with understanding which sensors and events can help det…☆49Updated 2 weeks ago
- SyntheticSun is a defense-in-depth security automation and monitoring framework which utilizes threat intelligence, machine learning, man…☆77Updated 3 years ago
- ☆36Updated 2 months ago
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆46Updated this week
- The objective of this program is to leverage AI-LLM technology to process of human language-based CTI documents to succinctly summarize t…☆45Updated 10 months ago
- Risks and targets for assessing LLMs & LLM vulnerabilities☆30Updated 9 months ago
- 🚨ATTENTION🚨 The VERIS mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here …☆72Updated 11 months ago
- ☆88Updated last year
- OWASP Machine Learning Security Top 10 Project☆81Updated last month
- "Linking Threat Tactics, Techniques, and Patterns with Defensive Weaknesses, Vulnerabilities and Affected Platform Configurations for Cyb…☆93Updated 8 months ago
- A collection of dashboards, templates, API's and Power BI code for vulnerability management and analysis☆15Updated last month
- Secure Jupyter Notebooks and Experimentation Environment☆67Updated 3 weeks ago
- ☆221Updated last month