kerberosmansour / InfoSecOpenAIExamples
InfoSec OpenAI Examples
☆19Updated last year
Alternatives and similar repositories for InfoSecOpenAIExamples:
Users that are interested in InfoSecOpenAIExamples are comparing it to the libraries listed below
- An example of a mis-configured Rails application release under MIT license.☆20Updated 2 years ago
- Scripts and misc. stuff related to the PortSwigger Web Academy☆17Updated 3 years ago
- Virtual Security Operations Center☆50Updated last year
- ☆18Updated 3 years ago
- ☆14Updated 2 years ago
- OWASP Foundation Web Respository☆29Updated 2 years ago
- An LLM and OCR based Indicator of Compromise Extraction Tool☆33Updated 3 months ago
- GCP GOAT is the vulnerable application for learn the GCP Security☆64Updated last year
- ☆41Updated 3 weeks ago
- ReconPal: Leveraging NLP for Infosec☆56Updated 2 years ago
- Maturity Model Collaborative project☆14Updated 2 years ago
- Semgrep rules corresponding to the OWASP ASVS standard☆27Updated 4 years ago
- 📚A curated list of product security resources.☆19Updated 2 years ago
- Docs: Vulnerability management aggregation of AppSec & OpSec (Tools Listing)☆30Updated last year
- LLM Testing Findings Templates☆69Updated last year
- GCP cloud security CTF☆44Updated last year
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆18Updated last year
- Run Capture the Flags and Security Trainings with OWASP WrongSecrets☆44Updated this week
- A fun POC that is built to understand AI security agents.☆25Updated 2 months ago
- ☆58Updated last year
- A vulnerable environment for exploring common GCP misconfigurations and vulnerabilities☆26Updated 8 months ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆31Updated 3 years ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆25Updated 3 years ago
- ☆19Updated last year
- ☆22Updated 4 years ago
- AI featured threat modeling and security review project☆16Updated 4 months ago
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆72Updated 10 months ago
- An experimental Velociraptor implementation using cloud infrastructure☆23Updated this week
- Contains all my research and content produced regarding the log4shell vulnerability☆31Updated 3 years ago