mitre-atlas / atlas-dataLinks
ATLAS tactics, techniques, and case studies data
☆77Updated 3 months ago
Alternatives and similar repositories for atlas-data
Users that are interested in atlas-data are comparing it to the libraries listed below
Sorting:
- CALDERA plugin for adversary emulation of AI-enabled systems☆100Updated last year
- Explore AI Supply Chain Risk with the AI Risk Database☆59Updated last year
- Secure Jupyter Notebooks and Experimentation Environment☆78Updated 5 months ago
- ☆53Updated 2 months ago
- ☆42Updated 7 months ago
- Test Software for the Characterization of AI Technologies☆260Updated this week
- A collection of agents that use Large Language Models (LLMs) to perform tasks common on our day to day jobs in cyber security.☆147Updated last year
- ☆38Updated 7 months ago
- OWASP Machine Learning Security Top 10 Project☆86Updated 6 months ago
- ☆105Updated last year
- Top 10 for Agentic AI (AI Agent Security) serves as the core for OWASP and CSA Red teaming work☆124Updated last month
- ☆254Updated 6 months ago
- Dropbox LLM Security research code and results☆231Updated last year
- ⚡ Vigil ⚡ Detect prompt injections, jailbreaks, and other potentially risky Large Language Model (LLM) inputs☆400Updated last year
- This repository holds the necessary content to produce the D3FEND ontology distribution.☆85Updated this week
- Code Repository for: AIRTBench: Measuring Autonomous AI Red Teaming Capabilities in Language Models☆66Updated this week
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆78Updated last year
- 🤖 A GitHub action that leverages fabric patterns through an agent-based approach☆30Updated 7 months ago
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆90Updated 2 months ago
- A benchmark for prompt injection detection systems.☆124Updated 2 weeks ago
- ☆288Updated last week
- A collection of prompt injection mitigation techniques.☆23Updated last year
- Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogue…☆69Updated last week
- Stakeholder-Specific Vulnerability Categorization☆156Updated this week
- OWASP Foundation Web Respository☆286Updated last week
- Autoconfigured ELK Stack That Contains All EPSS and NVD CVE Data☆52Updated last month
- OASIS Cyber Threat Intelligence (CTI) TC: A tool for generating STIX content for prototyping and testing. https://github.com/oasis-open/c…☆41Updated last year
- source code for the offsecml framework☆41Updated last year
- Security Control Knowledge Graph☆29Updated last year
- Open Source Tool - Cybersecurity Graph Database in Neo4j☆62Updated last year