AI Security Shared Responsibility Model
☆90Sep 26, 2025Updated 6 months ago
Alternatives and similar repositories for ai-security-shared-responsibility
Users that are interested in ai-security-shared-responsibility are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- AWS audits, without screenshots☆29Mar 18, 2026Updated last week
- Performing secure code review with LLMs (and vibe coding IDEs)☆38Aug 5, 2025Updated 7 months ago
- ☆54Mar 20, 2026Updated last week
- Rules shared by the community from 100 Days of YARA 2025☆38Jan 2, 2026Updated 2 months ago
- Reviews and tests of security products☆17Dec 28, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A security tool that detects malicious packages from external vulnerability feeds and searches for them in your package registries or art…☆69Nov 27, 2025Updated 4 months ago
- OWASP Foundation web repository☆53Mar 10, 2026Updated 2 weeks ago
- Miscellaneous materials related to the "attested TLS" proof-of-concept☆22Oct 25, 2023Updated 2 years ago
- Data about all known supply-chain attacks through history☆64May 28, 2025Updated 9 months ago
- ☆56Jan 20, 2026Updated 2 months ago
- Flowlyt is a security analyzer that scans GitHub Actions workflows to detect malicious patterns, misconfigurations, and secrets exposure,…☆15Mar 19, 2026Updated last week
- SVG Analysis and generation tools for commonly seen SVG attachment phishing☆55Sep 24, 2025Updated 6 months ago
- Cyber Threats Detection Rules☆14Sep 16, 2025Updated 6 months ago
- All about ransomware notes and extension files.☆14Aug 26, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- NOVA: The Prompt Pattern Matching☆121Jan 27, 2026Updated 2 months ago
- A comprehensive framework and assessment toolkit for measuring and improving Cloud Native security maturity across 8 critical business fu…☆10Jun 24, 2025Updated 9 months ago
- Threat Simulator for Enterprise Networks☆14May 14, 2022Updated 3 years ago
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆74Jun 21, 2024Updated last year
- This repository contains tools made by completing exercises from various books on blackhat programming. The intent is to learn writing so…☆13Mar 16, 2026Updated last week
- This repository provides examples of Vulnerable and Mitigated code as per CWE Categorization.☆23May 4, 2024Updated last year
- Threat hunting repo for my independent study on threat hunting with OSQuery☆27Jan 16, 2018Updated 8 years ago
- OWASP Foundation Web Respository☆22Oct 9, 2025Updated 5 months ago
- OWASP Foundation web repository☆44Mar 9, 2026Updated 2 weeks ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Aug 30, 2024Updated last year
- ☆11Dec 10, 2023Updated 2 years ago
- Detection scripts for MDM deployment to identify OpenClaw installations on managed devices.☆80Mar 13, 2026Updated 2 weeks ago
- Open-source, enterprise-grade threat modeling platform☆32Updated this week
- GPT API Cost Estimation for Enterprises☆14Oct 24, 2023Updated 2 years ago
- ☆67Mar 9, 2026Updated 2 weeks ago
- ☆171Jun 11, 2025Updated 9 months ago
- Comprehensive adversary emulation tool for security testing on Google Cloud Platform (GCP) environments.☆14Jun 14, 2024Updated last year
- ☆22Mar 24, 2025Updated last year
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Listener that spawns a new tmux window for each incoming reverse shell + Supports listening on many ports☆60Jul 13, 2025Updated 8 months ago
- Infinite scroll for your Ember app☆18Aug 5, 2015Updated 10 years ago
- A collection of my Semgrep rules☆51Jul 4, 2023Updated 2 years ago
- ZAP scripts to implement ASVS L1 checking☆17Apr 28, 2022Updated 3 years ago
- An Evil OIDC Server☆53Oct 19, 2022Updated 3 years ago
- kntrl is an eBPF based runtime agent that monitors and prevents anomalous behaviour defined by you on your pipeline. kntrl achieves this …☆125Mar 19, 2026Updated last week
- ☆38Dec 29, 2024Updated last year