☆14Jun 15, 2024Updated last year
Alternatives and similar repositories for ThreatModels
Users that are interested in ThreatModels are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- AI Security Research☆16Jun 21, 2023Updated 2 years ago
- LobotoMl is a set of scripts and tools to assess production deployments of ML services☆10May 16, 2022Updated 4 years ago
- Bundle of security analysis scripts for keras tensorflow models☆16Apr 15, 2024Updated 2 years ago
- A security-first linter for code that shouldn't need linting☆19Sep 12, 2023Updated 2 years ago
- exploiting and defending neural networks(神经网络攻防专栏)☆15Mar 2, 2021Updated 5 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ☆20Jun 25, 2024Updated last year
- AI fun☆27Feb 27, 2025Updated last year
- source code for the offsecml framework☆45Jun 6, 2024Updated last year
- LLM | Security | Operations in one github repo with good links and pictures.☆109May 15, 2026Updated last week
- This repository is for collection of user stories describing evolving requirements of stakeholders involved in the research data lifecycl…☆14Oct 2, 2017Updated 8 years ago
- A collection of sample code used in some experiments with Sliver C2☆17Mar 28, 2023Updated 3 years ago
- 🛡️ CyberORDA: Энциклопедия безопасной разработки. Учитесь, делитесь знаниями и делайте AppSec Great Again вместе! ✍️🔒☆54Oct 11, 2025Updated 7 months ago
- Threat models, verification standards, and security controls for AI agent architectures. Built on OWASP AISVS and NIST AI RMF.☆21Feb 17, 2026Updated 3 months ago
- Android监控器(Activity异常destroy , 隐私政策合规)☆11Nov 18, 2021Updated 4 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- This repository is dedicated to providing comprehensive mappings of the OWASP Top 10 vulnerabilities for Large Language Models (LLMs) to …☆40Feb 15, 2024Updated 2 years ago
- AI Course☆22Nov 1, 2024Updated last year
- Generative web directory fuzzer,crawling and subdomain checker based on chatgpt☆15May 15, 2024Updated 2 years ago
- ☆49Feb 25, 2026Updated 2 months ago
- CVE-2023-50254: PoC Exploit for Deepin-reader RCE that affects unpatched Deepin Linux Desktops. Deepin Linux's default document reader "d…☆16Dec 22, 2023Updated 2 years ago
- Repo containing documentation and explanation for CSET's harm taxonomy of incidents from AIID.☆20Jun 21, 2024Updated last year
- OWASP Foundation Web Respository☆12Apr 21, 2026Updated last month
- 📄 [Talk] OFFZONE 2022 / ODS Data Halloween 2022: Black-box attacks on ML models + with use of open-source tools☆14May 23, 2023Updated 2 years ago
- windows remote lock and unlock screen.☆14Sep 20, 2018Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆13Feb 18, 2024Updated 2 years ago
- A simple way to exfiltrate data using spotify API☆19Apr 20, 2026Updated last month
- Caido plugin for jxscout☆15May 11, 2026Updated last week
- keep watching new bug bounty (vulnerability) postings.☆12Apr 7, 2024Updated 2 years ago
- ReconPro is a specialized Google dorking tool designed for cybersecurity professionals and bug bounty hunters.☆47Mar 22, 2026Updated 2 months ago
- Scripts and outputs for ATLAS data in STIX JSON and ATT&CK Navigator layer formats☆32Apr 30, 2026Updated 3 weeks ago
- ☆18Jun 20, 2023Updated 2 years ago
- A large labeled corpus for Application Privacy Policy in Chinese to train named entity recognition models for Android Dangerous PERMSSION…☆11Jun 19, 2025Updated 11 months ago
- Automatic Microsoft Sentinel Deployment☆16Apr 1, 2025Updated last year
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ☆12May 19, 2025Updated last year
- Official Tensorflow implementation for "Improving the Transferability of Adversarial Samples by Path-Augmented Method" (CVPR 2023).☆12Jun 16, 2023Updated 2 years ago
- Example agents for the Dreadnode platform☆33Dec 19, 2025Updated 5 months ago
- ☆45Dec 12, 2024Updated last year
- Official Implementation of the CVPR'23 paper 'Regularization of polynomial networks for image recognition'.☆10Jun 8, 2023Updated 2 years ago
- A Post-exploitation Toolset for Interacting with the Microsoft Graph API☆13Nov 1, 2023Updated 2 years ago
- The companion code to the paper "Model-based Causal Bayesian Optimization"☆11Nov 16, 2022Updated 3 years ago