kantega / elevation-of-mlsec
Elevation of MLsec: a threat-modeling card game for machine learning systems
☆23Updated 3 months ago
Alternatives and similar repositories for elevation-of-mlsec:
Users that are interested in elevation-of-mlsec are comparing it to the libraries listed below
- StartLeft is an automation tool for generating Threat Models written in the Open Threat Model (OTM) format from a variety of different so…☆50Updated last week
- Repository for on-going work as part of the AIBOM Tiger Team effort.☆19Updated 6 months ago
- ☆98Updated 3 weeks ago
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆61Updated 9 months ago
- KEV EPSS Data☆22Updated this week
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆62Updated 2 weeks ago
- ATHI — An AI Threat Modeling Framework for Policymakers☆50Updated last year
- AI featured threat modeling and security review action☆43Updated 4 months ago
- Potential WG on Artificial Intelligence and Machine Learning (AI/ML)☆69Updated 5 months ago
- Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogue…☆56Updated 3 weeks ago
- Dragon-GPT uses Chat-GPT, or local LLM, to execute automatic and AI-powered threat modeling analysis on a given OWASP Threat Dragon diagr…☆34Updated last month
- Core model including reused documentation☆95Updated this week
- OWASP Foundation Web Respository☆28Updated 7 months ago
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆58Updated last year
- OWASP Machine Learning Security Top 10 Project☆83Updated last month
- OWASP Ontology-driven Threat Modelling framework☆37Updated last year
- ☆30Updated last month
- Curated list of Open Source project focused on LLM security☆37Updated 4 months ago
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆170Updated 4 months ago
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆73Updated 10 months ago
- ☆57Updated 11 months ago
- ☆33Updated 3 years ago
- An AI-powered tool for discovering privilege escalation opportunities in AWS IAM configurations.☆105Updated 5 months ago
- Project LLM Verification Standard☆41Updated 11 months ago
- ☆36Updated 3 months ago
- A full insecure kubernetes application for testing security tools☆70Updated this week
- A project to visualize the software supply chain☆43Updated last year
- 🤖 A GitHub action that leverages fabric patterns through an agent-based approach☆20Updated 2 months ago
- Secure Jupyter Notebooks and Experimentation Environment☆72Updated last month
- Test Software for the Characterization of AI Technologies☆242Updated this week