mitre-atlas / atlas-data
ATLAS tactics, techniques, and case studies data
☆49Updated last month
Related projects ⓘ
Alternatives and complementary repositories for atlas-data
- Explore AI Supply Chain Risk with the AI Risk Database☆50Updated 6 months ago
- Secure Jupyter Notebooks and Experimentation Environment☆55Updated 2 weeks ago
- CALDERA plugin for adversary emulation of AI-enabled systems☆85Updated last year
- ☆20Updated last month
- Code for shelLM tool☆44Updated last week
- A collection of agents that use Large Language Models (LLMs) to perform tasks common on our day to day jobs in cyber security.☆55Updated 6 months ago
- ☆98Updated 5 months ago
- OASIS Cyber Threat Intelligence (CTI) TC: A tool for generating STIX content for prototyping and testing. https://github.com/oasis-open/c…☆40Updated 6 months ago
- ☆69Updated this week
- Payloads for Attacking Large Language Models☆62Updated 4 months ago
- OWASP Machine Learning Security Top 10 Project☆76Updated 2 months ago
- The project serves as a strategic advisory tool, capitalizing on the ZySec series of AI models to amplify the capabilities of security pr…☆39Updated 5 months ago
- ☆11Updated last year
- Tree of Attacks (TAP) Jailbreaking Implementation☆94Updated 9 months ago
- Test Software for the Characterization of AI Technologies☆225Updated this week
- Data Scientists Go To Jupyter☆57Updated 2 years ago
- ☆184Updated 3 months ago
- source code for the offsecml framework☆35Updated 5 months ago
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆23Updated 2 months ago
- ☆93Updated last month
- A CLI wrapper for libmodsecurity (v3.0.10)☆11Updated 11 months ago
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆67Updated 6 months ago
- ☆27Updated 3 years ago
- Sensor Mappings to ATT&CK is a collection of resources to assist cyber defenders with understanding which sensors and events can help det…☆45Updated 5 months ago
- "Linking Threat Tactics, Techniques, and Patterns with Defensive Weaknesses, Vulnerabilities and Affected Platform Configurations for Cyb…☆87Updated 4 months ago
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆44Updated 2 weeks ago
- A repository of Language Model Vulnerabilities and Exposures (LVEs).☆106Updated 7 months ago
- ☆22Updated 9 months ago
- STIX 2.1 Visualizer, Attack and Activity Thread Graph for Threat Modeling☆32Updated last year
- ☆19Updated 4 years ago