moohax / Charcuterie
Data Scientists Go To Jupyter
☆62Updated 2 months ago
Alternatives and similar repositories for Charcuterie
Users that are interested in Charcuterie are comparing it to the libraries listed below
Sorting:
- source code for the offsecml framework☆40Updated 11 months ago
- Tree of Attacks (TAP) Jailbreaking Implementation☆107Updated last year
- Central repo for talks and presentations☆46Updated 9 months ago
- ☆16Updated last year
- using ML models for red teaming☆43Updated last year
- Copy cat model for Proofpoint☆83Updated 5 years ago
- An interactive CLI application for interacting with authenticated Jupyter instances.☆53Updated this week
- A YAML based format for describing tools to LLMs, like man pages but for robots!☆70Updated last week
- ☆104Updated 11 months ago
- A utility to inspect, validate, sign and verify machine learning model files.☆57Updated 3 months ago
- LLM Testing Findings Templates☆72Updated last year
- Machine learning enabled dropper☆27Updated 2 years ago
- ☆39Updated this week
- A serverless C2 framework☆12Updated 2 years ago
- ☆39Updated 5 months ago
- ☆26Updated 4 months ago
- AI-Powered, Local Pythonic Coding Agent 🐞💻☆23Updated 2 months ago
- List of Red Team Resources☆17Updated 4 years ago
- Awesome products for securing AI systems includes open source and commercial options and an infographic licensed CC-BY-SA-4.0.☆62Updated 10 months ago
- Examine Chrome extensions for security issues☆81Updated 2 months ago
- A command line tool for extracting machine learning ready data from software binaries powered by Radare2☆69Updated last week
- Minimal workflows☆19Updated last year
- This CALDERA Plugin converts Adversary Emulation Plans from the Center for Threat Informed Defense☆30Updated 2 months ago
- Slackhound allows red and blue teams to perform fast reconnaissance on Slack workspaces/organizations to quickly search user profiles, lo…☆81Updated last year
- Collection of red machine learning projects☆40Updated 3 years ago
- Attack Tool Timing and Reporting - Structured Attack Logging Format☆21Updated 2 years ago
- NOVA: The Prompt Pattern Matching☆75Updated 2 weeks ago
- CALDERA plugin for adversary emulation of AI-enabled systems☆96Updated last year
- ☆15Updated 2 years ago
- Modular malware analysis artifact collection and correlation framework☆53Updated last year