mitre-atlas / atlas-dataLinks
ATLAS tactics, techniques, and case studies data
☆77Updated last week
Alternatives and similar repositories for atlas-data
Users that are interested in atlas-data are comparing it to the libraries listed below
Sorting:
- Explore AI Supply Chain Risk with the AI Risk Database☆60Updated last year
- CALDERA plugin for adversary emulation of AI-enabled systems☆100Updated 2 years ago
- Secure Jupyter Notebooks and Experimentation Environment☆79Updated 6 months ago
- ☆54Updated 3 months ago
- Test Software for the Characterization of AI Technologies☆260Updated last week
- OWASP Machine Learning Security Top 10 Project☆88Updated 6 months ago
- Code Repository for: AIRTBench: Measuring Autonomous AI Red Teaming Capabilities in Language Models☆72Updated last week
- Dropbox LLM Security research code and results☆233Updated last year
- ☆42Updated 8 months ago
- ☆258Updated 7 months ago
- SMET : Semantic Mapping of CVE to ATT&CK and its Application to Cybersecurity☆47Updated 11 months ago
- source code for the offsecml framework☆41Updated last year
- Open Source Tool - Cybersecurity Graph Database in Neo4j☆62Updated last year
- ☆105Updated last year
- ☆38Updated 7 months ago
- ☆59Updated 10 months ago
- A collection of agents that use Large Language Models (LLMs) to perform tasks common on our day to day jobs in cyber security.☆151Updated last year
- A benchmark for prompt injection detection systems.☆125Updated last month
- ☆12Updated 2 years ago
- This repository holds the necessary content to produce the D3FEND ontology distribution.☆87Updated this week
- Top 10 for Agentic AI (AI Agent Security) serves as the core for OWASP and CSA Red teaming work☆131Updated 2 months ago
- A collection of prompt injection mitigation techniques.☆23Updated 2 years ago
- ☆49Updated 9 months ago
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆90Updated 3 months ago
- ☆63Updated 2 weeks ago
- All things specific to LLM Red Teaming Generative AI☆28Updated 10 months ago
- Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogue…☆70Updated last week
- Data Scientists Go To Jupyter☆65Updated 5 months ago
- ⚡ Vigil ⚡ Detect prompt injections, jailbreaks, and other potentially risky Large Language Model (LLM) inputs☆407Updated last year
- Payloads for Attacking Large Language Models☆94Updated 2 months ago