kaplanlior / oss-llm-securityLinks
Curated list of Open Source project focused on LLM security
☆69Updated 3 weeks ago
Alternatives and similar repositories for oss-llm-security
Users that are interested in oss-llm-security are comparing it to the libraries listed below
Sorting:
- ☆355Updated 3 months ago
- One Conference 2024☆111Updated last year
- ☆55Updated 8 months ago
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆99Updated 3 months ago
- NOVA: The Prompt Pattern Matching☆63Updated 2 months ago
- AI Security Shared Responsibility Model☆87Updated 3 months ago
- A curated list of LLM driven Cyber security Resources☆44Updated 2 months ago
- Code Repository for: AIRTBench: Measuring Autonomous AI Red Teaming Capabilities in Language Models☆92Updated this week
- Save toil in security operations with: Detection & Intelligence Analysis for New Alerts (D.I.A.N.A. )☆223Updated last year
- ☆283Updated 4 months ago
- Benchmarking LLM agents on Cyber Threat Investigation.☆109Updated this week
- ☆44Updated last year
- ☆422Updated this week
- ☆38Updated last year
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆215Updated last week
- ☆93Updated 3 weeks ago
- Top 10 for Agentic AI (AI Agent Security) serves as the core for OWASP and CSA Red teaming work☆162Updated 3 months ago
- ☆127Updated last week
- ☆57Updated 3 weeks ago
- Vulnerability impact analyzer that reduces false positives in SCA tools by performing intelligent code analysis. Uses agentic AI with ope…☆62Updated 10 months ago
- Halberd : Multi-Cloud Agentic Attack Tool☆328Updated last week
- OWASP Foundation Web Respository☆339Updated this week
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆100Updated 2 years ago
- An experimental project using LLM technology to generate security documentation for Open Source Software (OSS) projects☆34Updated 10 months ago
- CALDERA plugin for adversary emulation of AI-enabled systems☆108Updated 2 years ago
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆82Updated last year
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆59Updated 2 years ago
- An AI-powered tool for discovering privilege escalation opportunities in AWS IAM configurations.☆117Updated last week
- AIGoat: A deliberately Vulnerable AI Infrastructure. Learn AI security through solving our challenges.☆262Updated 4 months ago
- ✨ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The …☆286Updated last year