jpyoda / mitre-framework-llmLinks
Welcome to MitreMesh. Where MITRE's framework meets dynamic scenario generation, creating a comprehensive net of incident response tests for cybersecurity professionals.
☆16Updated last year
Alternatives and similar repositories for mitre-framework-llm
Users that are interested in mitre-framework-llm are comparing it to the libraries listed below
Sorting:
- The objective of this program is to leverage AI-LLM technology to process of human language-based CTI documents to succinctly summarize t…☆54Updated 3 weeks ago
- Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogue…☆63Updated this week
- ATLAS tactics, techniques, and case studies data☆74Updated 2 months ago
- ☆47Updated last month
- The project serves as a strategic advisory tool, capitalizing on the ZySec series of AI models to amplify the capabilities of security pr…☆51Updated last year
- ☆52Updated 8 months ago
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆89Updated last month
- Top 10 for Agentic AI (AI Agent Security) serves as the core for OWASP and CSA Red teaming work☆112Updated 2 weeks ago
- ☆104Updated last year
- Vulnerability impact analyzer that reduces false positives in SCA tools by performing intelligent code analysis. Uses agentic AI with ope…☆55Updated 4 months ago
- A curated list of LLM driven Cyber security Resources☆31Updated 3 weeks ago
- CALDERA plugin for adversary emulation of AI-enabled systems☆99Updated last year
- "Linking Threat Tactics, Techniques, and Patterns with Defensive Weaknesses, Vulnerabilities and Affected Platform Configurations for Cyb…☆95Updated 11 months ago
- Curated list of Open Source project focused on LLM security☆45Updated 7 months ago
- ☆40Updated 6 months ago
- Extracts IoCs, TTPs and the relationships between them. Outputs a STIX 2.1 bundle.☆59Updated last week
- 🤖 A GitHub action that leverages fabric patterns through an agent-based approach☆27Updated 5 months ago
- SMET : Semantic Mapping of CVE to ATT&CK and its Application to Cybersecurity☆47Updated 9 months ago
- ☆38Updated this week
- ☆37Updated 5 months ago
- Reference notes for Attacking and Defending Generative AI presentation☆63Updated 10 months ago
- Explore AI Supply Chain Risk with the AI Risk Database☆58Updated last year
- A collection of agents that use Large Language Models (LLMs) to perform tasks common on our day to day jobs in cyber security.☆126Updated last year
- Save toil in security operations with: Detection & Intelligence Analysis for New Alerts (D.I.A.N.A. )☆185Updated 9 months ago
- Sensor Mappings to ATT&CK is a collection of resources to assist cyber defenders with understanding which sensors and events can help det…☆50Updated this week
- Intelligence around common attacker behaviors (MITRE ATT&CK TTPs), in the form of ATT&CK Navigator "layer" json files.☆35Updated 2 years ago
- A collection of dashboards, templates, API's and Power BI code for vulnerability management and analysis☆23Updated 4 months ago
- Code for shelLM tool☆55Updated 4 months ago
- Secure Jupyter Notebooks and Experimentation Environment☆76Updated 4 months ago
- One Conference 2024☆111Updated 8 months ago