oasiszrz / awesome-AISecOpsLinks
This repository contains a curated list of awesome resources related to AISecOps.
☆18Updated 4 years ago
Alternatives and similar repositories for awesome-AISecOps
Users that are interested in awesome-AISecOps are comparing it to the libraries listed below
Sorting:
- ☆85Updated 5 years ago
- 中文网络安全运营领域开源语料库☆41Updated 5 months ago
- 企业级安全智能化实践☆70Updated 3 years ago
- 利用预训练语言模型从非结构化威胁报告中提取 MITRE ATT&CK TTP 信息☆75Updated 2 years ago
- 黑客画像构建以及威胁事件的预测,通过搜集各大黑客技术论坛的聊天记录,绘制任务的拓扑图,以及技能雷达图。同时进一步预测监控攻击事件的发生以及溯源☆21Updated 6 years ago
- The following is a simple example of how LLMs and langchain agents can simplify asking questions to understand the security posture of a …☆23Updated 2 years ago
- 记录我的安全学术学习☆129Updated 5 years ago
- AutoSpear☆71Updated 2 years ago
- Analysis of HTTP traffic and detection of anomalous user behavior in allowed actions. UEBA system.☆24Updated 2 years ago
- ☆112Updated last year
- Jupyter Kernel for CodeQL☆15Updated 10 months ago
- 近年来容器安全相关论文收集整理☆15Updated 2 years ago
- 该资源为作者AI安全相关论文 的分享知识,包括PPT和PDF版本及原文,希望对您有所帮助。加油~☆33Updated last year
- ☆27Updated 3 years ago
- This repository contains attack chains generated by Aurora that can be reproduced in virtual environments.☆38Updated 5 months ago
- Neo4J visualisation tool for the Code Property Graph☆14Updated 4 years ago
- Testability Tarpits: the Impact of Code Patterns on the Security Testing of Web Applications (NDSS 2022)☆25Updated last year
- Based on Lightspin proprietary data, research, and our tracking of cloud security trends in the market, our research team has compiled a …☆40Updated 3 years ago
- 漏洞规则库是一个致力于帮助开发者识别和避免常见安全漏洞的开源项目。我们收集、整理和分析各类编程语言和常用库中的安全漏洞模式,并提供相应的防范措施和最佳实践。☆38Updated 4 months ago
- 基于机器学习的 Webshell 检测 (OPCode -> N-Gram -> TF-IDF -> XGBoost)☆47Updated 4 years ago
- Code for "Analyzing the Perceived Severity of Cybersecurity Threats Reported on Social Media".☆25Updated 6 years ago
- 基于JVM-Sandbox实现RASP安全监控防护☆53Updated 2 years ago
- Open-Source Vulnerability Intelligence Center - Unified source of vulnerability, exploit and threat Intelligence feeds☆140Updated this week
- A curated list of audit rules which extract from Source Code Auditing tools.☆15Updated 5 years ago
- Automatically collects the known CVE and its corresponding Poc, and sends it to the LLM for analysis, disassembles the attack steps, gene…☆20Updated last year
- Anomaly detection based on DNS traffic analysis☆54Updated 5 years ago
- A Knowledge Graph for Open Source Security Tools☆18Updated 2 years ago
- awesome resources about cloud native security 🐿☆322Updated 2 years ago
- NVD/CVE as JSON files☆123Updated this week
- collections of container escape techniques 🐿☆73Updated 4 years ago