☆56May 5, 2025Updated 10 months ago
Alternatives and similar repositories for Top-Threats-for-AI-Agents
Users that are interested in Top-Threats-for-AI-Agents are comparing it to the libraries listed below
Sorting:
- Top 10 for Agentic AI (AI Agent Security) serves as the core for OWASP and CSA Red teaming work☆174Oct 7, 2025Updated 5 months ago
- Repo for MGraph project☆13Jan 10, 2026Updated 2 months ago
- TACOS framework structural details☆20May 12, 2025Updated 9 months ago
- Generative AI Governance for Enterprises☆16Dec 29, 2024Updated last year
- ☆38Dec 29, 2024Updated last year
- Prototype in-toto attestation verifier based on ITE-10 and ITE-11 layouts☆18Feb 27, 2026Updated last week
- ☆23Jan 17, 2025Updated last year
- A MAL language that demonstrates the Maven project structure☆23Feb 27, 2026Updated last week
- ☆26May 19, 2025Updated 9 months ago
- ☆53Dec 19, 2024Updated last year
- Practical Library Of Threats 4 Artificial Intelligence☆36Jun 19, 2025Updated 8 months ago
- CVSS v4.0 calculator☆39Aug 19, 2024Updated last year
- Repository for the generation of OSCAL data types☆28Updated this week
- Save toil in security operations with: Detection & Intelligence Analysis for New Alerts (D.I.A.N.A. )☆223Sep 4, 2024Updated last year
- Repository for on-going work as part of the SBOM for AI Tiger Team effort.☆42Jul 28, 2025Updated 7 months ago
- ⚡ Vigil ⚡ Detect prompt injections, jailbreaks, and other potentially risky Large Language Model (LLM) inputs☆462Jan 31, 2024Updated 2 years ago
- Simplify OpenSSF Scorecard tracking in your organization with automated markdown and JSON reports, plus optional GitHub issue alerts☆44Feb 28, 2026Updated last week
- data-mesh-demo☆13Apr 12, 2022Updated 3 years ago
- OWASP Foundation web repository☆16Oct 11, 2025Updated 4 months ago
- A tool to create, transform and attest VEX metadata☆176Mar 2, 2026Updated last week
- An open-source, detailed blueprint for implementing highly scalable swarms of specialized AI Agents in enterprise product development, em…☆47Jul 19, 2025Updated 7 months ago
- ☆42Jan 9, 2025Updated last year
- Burp extension to fuzz/brute force GenAI/LLM prompts for potential behvioural and Prompt Injection vulnerabilities.☆13Sep 3, 2025Updated 6 months ago
- Dump macOS 1.8+ password hashes to a hashcat-compatible format☆14May 29, 2022Updated 3 years ago
- DRP - A websocket subprotocol for declaring and consuming resources☆13Aug 28, 2025Updated 6 months ago
- StartLeft is an automation tool for generating Threat Models written in the Open Threat Model (OTM) format from a variety of different so…☆53Updated this week
- Fluxion is a easy to use wifi cracker, to test your own network☆11Feb 8, 2017Updated 9 years ago
- ☆19Mar 2, 2026Updated last week
- Official website for the TRON (Token Reduced Object Notation) format☆36Nov 29, 2025Updated 3 months ago
- SmaliAnalyzer parses dissasembled bytecode of Android applications to gather as much information as possible about their component classe…☆13Apr 17, 2019Updated 6 years ago
- Automate ISSG Tool Setups☆13Nov 21, 2024Updated last year
- Helm plugin for install charts from Github Releases☆13Jul 25, 2023Updated 2 years ago
- GPT API Cost Estimation for Enterprises☆13Oct 24, 2023Updated 2 years ago
- OSCAL SDK for the Go programming language☆20Oct 30, 2025Updated 4 months ago
- Test Software for the Characterization of AI Technologies☆281Updated this week
- Agent Name Service (ANS) Protocol, introduced by the OWASP GenAI Security Project, is a foundational framework designed to facilitate sec…☆59May 16, 2025Updated 9 months ago
- Go module to generate and transform VEX documents☆55Mar 3, 2026Updated last week
- Proof of concept implementation of a cyber threat intelligence and incident handling platform☆11Feb 10, 2023Updated 3 years ago
- This sample shows a simple use of the iOS HealthKit APIs.☆11Feb 16, 2018Updated 8 years ago