protectai / nbdefenseLinks
Secure Jupyter Notebooks and Experimentation Environment
☆79Updated 6 months ago
Alternatives and similar repositories for nbdefense
Users that are interested in nbdefense are comparing it to the libraries listed below
Sorting:
- ATLAS tactics, techniques, and case studies data☆77Updated last week
- CALDERA plugin for adversary emulation of AI-enabled systems☆100Updated 2 years ago
- Dropbox LLM Security research code and results☆233Updated last year
- using ML models for red teaming☆44Updated 2 years ago
- A fun POC that is built to understand AI security agents.☆32Updated 8 months ago
- A compilation of Software Supply Chain Security resources including initiatives, standards, regulations, organizations, vendors, tooling,…☆136Updated last year
- LLM Testing Findings Templates☆72Updated last year
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆90Updated 3 months ago
- A comprehensive security scanner for Model Context Protocol (MCP) servers that detects vulnerabilities and security issues in your MCP se…☆80Updated this week
- Data Scientists Go To Jupyter☆65Updated 5 months ago
- An interactive CLI application for interacting with authenticated Jupyter instances.☆53Updated 3 months ago
- ☆112Updated 2 years ago
- ⚡ Vigil ⚡ Detect prompt injections, jailbreaks, and other potentially risky Large Language Model (LLM) inputs☆407Updated last year
- An AI-powered tool for discovering privilege escalation opportunities in AWS IAM configurations.☆114Updated 3 weeks ago
- source code for the offsecml framework☆41Updated last year
- Data about all known supply-chain attacks through history☆58Updated 2 months ago
- A security-first linter for code that shouldn't need linting☆16Updated last year
- Protection against Model Serialization Attacks☆547Updated last week
- Top 10 for Agentic AI (AI Agent Security) serves as the core for OWASP and CSA Red teaming work☆131Updated 2 months ago
- PEACH - a step-by-step framework for modeling and improving SaaS and PaaS tenant isolation, by managing the attack surface exposed by use…☆71Updated 2 years ago
- Focused malicious code detection ruleset, with a high protection-to-noise ratio☆123Updated 6 months ago
- ☆38Updated 7 months ago
- Code Repository for: AIRTBench: Measuring Autonomous AI Red Teaming Capabilities in Language Models☆72Updated last week
- Autoconfigured ELK Stack That Contains All EPSS and NVD CVE Data☆52Updated 2 months ago
- A comprehensive, systematic and actionable way to understand attacker behaviors and techniques with respect to the software supply chain☆95Updated 6 months ago
- Payloads for Attacking Large Language Models☆94Updated 2 months ago
- an extension for Burp Suite to allow researchers to utilize GPT for analys is of HTTP requests and responses☆113Updated 2 years ago
- An experimental project using LLM technology to generate security documentation for Open Source Software (OSS) projects☆33Updated 5 months ago
- An open-source dataset of malicious software packages found in the wild, 100% vetted by humans.☆216Updated this week
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆78Updated last year