mitre-atlas / atlas-data
ATLAS tactics, techniques, and case studies data
☆67Updated 2 weeks ago
Alternatives and similar repositories for atlas-data:
Users that are interested in atlas-data are comparing it to the libraries listed below
- CALDERA plugin for adversary emulation of AI-enabled systems☆95Updated last year
- ☆39Updated this week
- Explore AI Supply Chain Risk with the AI Risk Database☆54Updated last year
- ☆39Updated 4 months ago
- Test Software for the Characterization of AI Technologies☆247Updated this week
- Secure Jupyter Notebooks and Experimentation Environment☆74Updated 3 months ago
- source code for the offsecml framework☆39Updated 11 months ago
- ☆36Updated 4 months ago
- ☆104Updated 11 months ago
- Top 10 for Agentic AI (AI Agent Security)☆95Updated last month
- OWASP Machine Learning Security Top 10 Project☆85Updated 3 months ago
- A collection of prompt injection mitigation techniques.☆22Updated last year
- Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogue…☆62Updated 3 weeks ago
- This repository holds the necessary content to produce the D3FEND ontology distribution.☆78Updated last week
- The project serves as a strategic advisory tool, capitalizing on the ZySec series of AI models to amplify the capabilities of security pr…☆47Updated 11 months ago
- NOVA: The Prompt Pattern Matching☆73Updated last week
- CVSS v4.0 calculator☆30Updated 8 months ago
- ☆242Updated 3 months ago
- Code for shelLM tool☆51Updated 3 months ago
- A benchmark for prompt injection detection systems.☆110Updated this week
- The Privacy Adversarial Framework (PAF) is a knowledge base of privacy-focused adversarial tactics and techniques. PAF is heavily inspire…☆55Updated last year
- Data Scientists Go To Jupyter☆62Updated 2 months ago
- Awesome products for securing AI systems includes open source and commercial options and an infographic licensed CC-BY-SA-4.0.☆62Updated 10 months ago
- Extracts IoCs, TTPs and the relationships between them. Outputs a STIX 2.1 bundle.☆53Updated this week
- A collection of agents that use Large Language Models (LLMs) to perform tasks common on our day to day jobs in cyber security.☆110Updated last year
- Project Mantis: Hacking Back the AI-Hacker; Prompt Injection as a Defense Against LLM-driven Cyberattacks☆67Updated 4 months ago
- TIE is a machine learning model for inferring associated MITRE ATT&CK techniques from previously observed techniques.☆50Updated 2 weeks ago
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆75Updated last year
- ☆43Updated 5 months ago
- ☆27Updated 4 years ago