Elevation of MLsec: a threat-modeling card game for machine learning systems
☆32Nov 24, 2025Updated 3 months ago
Alternatives and similar repositories for elevation-of-mlsec
Users that are interested in elevation-of-mlsec are comparing it to the libraries listed below
Sorting:
- Privacy Cards for Software Developers☆54May 17, 2019Updated 6 years ago
- A comprehensive framework and assessment toolkit for measuring and improving Cloud Native security maturity across 8 critical business fu…☆10Jun 24, 2025Updated 8 months ago
- An AI-Powered Privacy Threat Modeling tool based on the LINDDUN framework by leveraging Large Language Models.☆25Jul 25, 2025Updated 7 months ago
- ☆22Mar 24, 2025Updated 11 months ago
- ZAP scripts to implement ASVS L1 checking☆17Apr 28, 2022Updated 3 years ago
- SAMMY Open Source v2☆14Feb 6, 2025Updated last year
- Practical Library Of Threats 4 Artificial Intelligence☆36Jun 19, 2025Updated 9 months ago
- CVE-2024-23897 jenkins-cli☆15Jan 27, 2024Updated 2 years ago
- ☆14Dec 3, 2022Updated 3 years ago
- We borrow the concept of 'personas' from UX/service design and apply it to threat actors to improve understanding between security, techn…☆11Jun 17, 2020Updated 5 years ago
- Repo for the oreilly course about building agents with gpt assistants api☆18Oct 28, 2025Updated 4 months ago
- Core model including reused documentation☆102Dec 16, 2025Updated 3 months ago
- A Model Context Protocol server for Python code analysis with Claude. Again, works with warning now. I'm missing something here.☆12Nov 29, 2025Updated 3 months ago
- Public code release for the paper "Reawakening knowledge: Anticipatory recovery from catastrophic interference via structured training"☆11Oct 27, 2025Updated 4 months ago
- Code for the NAACL 2024 HCI+NLP Workshop paper "LLMCheckup: Conversational Examination of Large Language Models via Interpretability Tool…☆13Mar 24, 2024Updated last year
- Sequence Tagging for Biomedical Extractive Question Answering (Bioinformatics'2020)☆11Jul 3, 2023Updated 2 years ago
- Posture correction using computer vision and Mediapipe library enables the detection and correction of poor posture in images and live vi…☆11Apr 9, 2025Updated 11 months ago
- ☆44Oct 16, 2025Updated 5 months ago
- This repository contains the replication package of our paper "Assessing the Security of GitHub Copilot’s Generated Code - A Targeted Rep…☆10Nov 16, 2023Updated 2 years ago
- Implementation of an LLM prompting pipeline combined with wrappers for auto-decomposing reasoning steps and for search through the reason…☆16May 7, 2024Updated last year
- Scripts for AWS amusement...☆21May 3, 2022Updated 3 years ago
- Repository to create CCKGs from the paper "Similarity-weighted Construction of Contextualized Commonsense Knowledge Graphs for Knowledge-…☆11May 23, 2025Updated 9 months ago
- Zero Trust Agent☆50Mar 12, 2026Updated last week
- OWASP Foundation web repository☆43Mar 9, 2026Updated last week
- Source Code for 'AI for Healthcare with Keras and Tensorflow 2.0' by Anshik Bansal☆15Jul 19, 2021Updated 4 years ago
- This repository contains resources to support organizations’ use of the Privacy Framework. Resources include crosswalks, Profiles, guidel…☆62Feb 4, 2026Updated last month
- Contains 100+ Mulesoft Interview Questions☆13Apr 6, 2024Updated last year
- AI Code Critic: An efficient desktop app leveraging ChatGPT for automated, language-agnostic code reviews. Streamlines code analysis with…☆15Jan 19, 2024Updated 2 years ago
- Threat Modeling Tool Extension for Penetration Tester (TMTe4PT)☆12Mar 2, 2022Updated 4 years ago
- An online pdf editor that works on react-pdf and fabric js☆17Feb 28, 2023Updated 3 years ago
- Jira plug-in to capture and explore decision knowledge☆17Sep 1, 2023Updated 2 years ago
- A security tool that detects malicious packages from external vulnerability feeds and searches for them in your package registries or art…☆69Nov 27, 2025Updated 3 months ago
- Code samples from Practical Binary Analysis☆25May 23, 2020Updated 5 years ago
- Pathbyter is a lightning fast proof-of-concept ransomware that uses RSA wrapped AES, multiprocessing, in memory key encryption, appends e…☆26Sep 25, 2023Updated 2 years ago
- Python package to support the development of anticipatory action frameworks☆11Aug 24, 2023Updated 2 years ago
- Simple mind maps for IoT security attack surfaces and methodologies☆17Aug 12, 2019Updated 6 years ago
- A Framework For Intelligence Farming☆16Apr 3, 2025Updated 11 months ago
- ☆11May 7, 2022Updated 3 years ago
- The CTP MIRC Plugin☆15Aug 21, 2024Updated last year