☆56May 5, 2025Updated 11 months ago
Alternatives and similar repositories for Top-Threats-for-AI-Agents
Users that are interested in Top-Threats-for-AI-Agents are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Generate a matrix based on an inventory of InfoSec tools☆24Jul 4, 2024Updated last year
- ☆25Jan 17, 2025Updated last year
- Example agents for the Dreadnode platform☆30Dec 19, 2025Updated 3 months ago
- Practical Library Of Threats 4 Artificial Intelligence☆36Jun 19, 2025Updated 9 months ago
- Monitor Unused IAM Roles 🎓☆13Apr 30, 2021Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A curated list of AI driven Cyber security Resources☆48Mar 28, 2026Updated last week
- Archive of publicly available threat INTel reports (mostly APT Reports but not limited to).☆11Sep 30, 2018Updated 7 years ago
- ☆38Dec 29, 2024Updated last year
- Prevent cloud misconfigurations during build-time for Terraform, Cloudformation, Kubernetes, Serverless framework, and other infrastructu…☆11Jan 13, 2026Updated 2 months ago
- ☆27May 19, 2025Updated 10 months ago
- A minimal yet unstoppable blueprint for multi-agent AI—anchored by the rare, far-reaching “Multi-Agent AI DAO” (2017 Prior Art)—empowerin…☆32Jan 11, 2025Updated last year
- TACOS framework structural details☆20May 12, 2025Updated 10 months ago
- OWASP Foundation web repository☆17Oct 11, 2025Updated 5 months ago
- An open source UI for Meta LLama Stack Apps / Agents☆41Sep 10, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Generative AI Governance for Enterprises☆16Dec 29, 2024Updated last year
- An open-source knowledge base of defensive countermeasures to protect AI/ML systems. Features interactive views and maps defenses to know…☆145Updated this week
- windows remote lock and unlock screen.☆13Sep 20, 2018Updated 7 years ago
- A simple web application that uses Docker and Docker Compose.☆19Aug 23, 2022Updated 3 years ago
- Burp extension to fuzz/brute force GenAI/LLM prompts for potential behvioural and Prompt Injection vulnerabilities.☆13Sep 3, 2025Updated 7 months ago
- Codebase of https://arxiv.org/abs/2410.14923☆54Oct 22, 2024Updated last year
- Project LLM Verification Standard☆55Oct 6, 2025Updated 6 months ago
- AI-based implant feature☆25Apr 28, 2025Updated 11 months ago
- Binary, Analysis, and Disassembler Radare2 Plugins for Dan32 architechture binaries☆18Aug 21, 2017Updated 8 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆11Dec 1, 2023Updated 2 years ago
- Writeups of challenges and CTFs I participated in☆88Aug 25, 2025Updated 7 months ago
- Official Tensorflow implementation for "Improving the Transferability of Adversarial Samples by Path-Augmented Method" (CVPR 2023).☆12Jun 16, 2023Updated 2 years ago
- This is the GitHub repo of the OpenChain SBOM Study Group☆12Feb 18, 2026Updated last month
- ☆11Jun 7, 2025Updated 10 months ago
- Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogue…☆92Mar 2, 2026Updated last month
- Agent Name Service (ANS) Protocol, introduced by the OWASP GenAI Security Project, is a foundational framework designed to facilitate sec…☆64May 16, 2025Updated 10 months ago
- ☆44Jan 9, 2025Updated last year
- Fake IdP service for testing SAML☆16Sep 13, 2024Updated last year
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- A dataset containing Office 365 Unified Audit Logs for security research and detection☆58Jun 7, 2022Updated 3 years ago
- [TACL] Code for "Red Teaming Language Model Detectors with Language Models"☆24Nov 24, 2023Updated 2 years ago
- ☆14Jan 19, 2024Updated 2 years ago
- WPA Attack - Easy breaking WPA WPA2 networks by typing one command☆21Jun 15, 2015Updated 10 years ago
- A PowerShell-based script to analyze network logs from CSV files and detect potential beaconing behavior. Supports VirusTotal integration…☆17May 11, 2025Updated 10 months ago
- ☆13Apr 9, 2025Updated 11 months ago
- This repository provides a comprehensive Digital Footprint Checklist to help individuals manage their online presence and enhance privacy…☆17Dec 25, 2024Updated last year