mitre-atlas / atlas-data
ATLAS tactics, techniques, and case studies data
☆61Updated last month
Alternatives and similar repositories for atlas-data:
Users that are interested in atlas-data are comparing it to the libraries listed below
- Explore AI Supply Chain Risk with the AI Risk Database☆53Updated 11 months ago
- CALDERA plugin for adversary emulation of AI-enabled systems☆93Updated last year
- Secure Jupyter Notebooks and Experimentation Environment☆72Updated 2 months ago
- Risks and targets for assessing LLMs & LLM vulnerabilities☆30Updated 10 months ago
- Open Source Tool - Cybersecurity Graph Database in Neo4j☆58Updated last year
- Code for shelLM tool☆51Updated 2 months ago
- ☆36Updated 3 months ago
- A collection of prompt injection mitigation techniques.☆22Updated last year
- ☆39Updated 4 months ago
- OWASP Machine Learning Security Top 10 Project☆83Updated 2 months ago
- Data Scientists Go To Jupyter☆62Updated last month
- using ML models for red teaming☆43Updated last year
- ☆104Updated 10 months ago
- SMET : Semantic Mapping of CVE to ATT&CK and its Application to Cybersecurity☆46Updated 7 months ago
- OASIS Cyber Threat Intelligence (CTI) TC: A tool for generating STIX content for prototyping and testing. https://github.com/oasis-open/c…☆41Updated last year
- 🤖 A GitHub action that leverages fabric patterns through an agent-based approach☆22Updated 3 months ago
- source code for the offsecml framework☆38Updated 10 months ago
- A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports☆23Updated last year
- Tree of Attacks (TAP) Jailbreaking Implementation☆106Updated last year
- OWASP Ontology-driven Threat Modelling framework☆37Updated last year
- "Linking Threat Tactics, Techniques, and Patterns with Defensive Weaknesses, Vulnerabilities and Affected Platform Configurations for Cyb…☆92Updated 9 months ago
- ☆31Updated last month
- SecretBench is a dataset consisting of different secret types collected from public open-source repositories.☆30Updated 10 months ago
- This repository contains generated contextual data utilized by pyattck.☆19Updated last month
- Adversary Emulation Planner☆39Updated 9 months ago
- A collection of agents that use Large Language Models (LLMs) to perform tasks common on our day to day jobs in cyber security.☆102Updated 11 months ago
- A CLI wrapper for libmodsecurity (v3.0.10)☆12Updated last year
- Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogue…☆57Updated 2 weeks ago
- ☆24Updated 2 months ago
- Test Software for the Characterization of AI Technologies☆246Updated last week