kenhuangus / Top-Threats-for-AI-AgentsLinks
☆44Updated last month
Alternatives and similar repositories for Top-Threats-for-AI-Agents
Users that are interested in Top-Threats-for-AI-Agents are comparing it to the libraries listed below
Sorting:
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆80Updated 3 weeks ago
- ☆36Updated 5 months ago
- Curated list of Open Source project focused on LLM security☆43Updated 7 months ago
- Top 10 for Agentic AI (AI Agent Security)☆110Updated last week
- 🤖 A GitHub action that leverages fabric patterns through an agent-based approach☆27Updated 5 months ago
- ATLAS tactics, techniques, and case studies data☆73Updated last month
- HoneyAgents is a PoC demo of an AI-driven system that combines honeypots with autonomous AI agents to detect and mitigate cyber threats. …☆49Updated last year
- ☆48Updated last week
- One Conference 2024☆110Updated 8 months ago
- ☆40Updated 5 months ago
- NOVA: The Prompt Pattern Matching☆114Updated last month
- Save toil in security operations with: Detection & Intelligence Analysis for New Alerts (D.I.A.N.A. )☆183Updated 9 months ago
- Vulnerability impact analyzer that reduces false positives in SCA tools by performing intelligent code analysis. Uses agentic AI with ope…☆55Updated 3 months ago
- Agentic Workflows Made Simple☆143Updated 2 months ago
- Secure Jupyter Notebooks and Experimentation Environment☆75Updated 4 months ago
- An AI-powered tool for discovering privilege escalation opportunities in AWS IAM configurations.☆112Updated 8 months ago
- An experimental project using LLM technology to generate security documentation for Open Source Software (OSS) projects☆28Updated 3 months ago
- ☆104Updated last year
- A low-cost approach to testing AI chat experiences and security concepts☆24Updated last week
- CALDERA plugin for adversary emulation of AI-enabled systems☆96Updated last year
- A curated list of LLM driven Cyber security Resources☆31Updated last week
- source code for the offsecml framework☆40Updated last year
- An index of publicly available and open-source threat detection rulesets.☆112Updated last month
- ☆104Updated last week
- Project LLM Verification Standard☆44Updated 3 weeks ago
- Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogue…☆62Updated last week
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆58Updated last year
- ☆59Updated last year
- Delving into the Realm of LLM Security: An Exploration of Offensive and Defensive Tools, Unveiling Their Present Capabilities.☆163Updated last year
- A full insecure kubernetes application for testing security tools☆87Updated last month