protectai / nbdefense
Secure Jupyter Notebooks and Experimentation Environment
☆65Updated last week
Alternatives and similar repositories for nbdefense:
Users that are interested in nbdefense are comparing it to the libraries listed below
- ATLAS tactics, techniques, and case studies data☆55Updated 4 months ago
- An AI-powered tool for discovering privilege escalation opportunities in AWS IAM configurations.☆106Updated 4 months ago
- Protection against Model Serialization Attacks☆387Updated last week
- Potential WG on Artificial Intelligence and Machine Learning (AI/ML)☆60Updated 3 months ago
- A lightweight library to sanitize data provided to AI tools☆26Updated last year
- Rapidly identify and mitigate container security vulnerabilities with generative AI.☆78Updated this week
- CALDERA plugin for adversary emulation of AI-enabled systems☆89Updated last year
- Project LLM Verification Standard☆38Updated 10 months ago
- ☆35Updated last month
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆59Updated last year
- A comprehensive, systematic and actionable way to understand attacker behaviors and techniques with respect to the software supply chain☆90Updated last week
- A compilation of Software Supply Chain Security resources including initiatives, standards, regulations, organizations, vendors, tooling,…☆130Updated last year
- OWASP Machine Learning Security Top 10 Project☆80Updated 2 weeks ago
- An interactive CLI application for interacting with authenticated Jupyter instances.☆50Updated 11 months ago
- ☆36Updated 2 months ago
- A fun POC that is built to understand AI security agents.☆23Updated last month
- OWASP Foundation Web Respository☆234Updated last week
- A collection of prompt injection mitigation techniques.☆20Updated last year
- source code for the offsecml framework☆37Updated 8 months ago
- Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogue…☆52Updated this week
- Adaptive AWS Zero Trust Policy made easy: Auto-generate least-privilege policies based on user activity in real time! Accelerate the adop…☆76Updated 9 months ago
- Dropbox LLM Security research code and results☆220Updated 8 months ago
- A tool for preventing the installation of malicious PyPI and npm packages☆124Updated this week
- PEACH - a step-by-step framework for modeling and improving SaaS and PaaS tenant isolation, by managing the attack surface exposed by use…☆67Updated 2 years ago
- Curating Falco rules with MITRE ATT&CK Matrix☆77Updated 11 months ago
- Test Software for the Characterization of AI Technologies☆239Updated this week
- using ML models for red teaming☆42Updated last year
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆71Updated 9 months ago
- ATHI — An AI Threat Modeling Framework for Policymakers☆48Updated last year
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆61Updated 7 months ago