rzhade3 / adversarial-ai-reading-listLinks
Reading list of more resources to learn about Adversarial Attacks on AI Systems
β32Updated 2 months ago
Alternatives and similar repositories for adversarial-ai-reading-list
Users that are interested in adversarial-ai-reading-list are comparing it to the libraries listed below
Sorting:
- ποΈ STRIDE vs. ASVS equivalence tableβ76Updated last year
- β66Updated last month
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.β176Updated 9 months ago
- AI featured threat modeling and security review actionβ45Updated 9 months ago
- Segment's Threat Modeling training for our engineersβ245Updated 4 years ago
- App that simplifies building decision trees to model adverse scenariosβ216Updated last year
- A dataset of software supply chain compromises. Please help us maintain it!β130Updated 2 years ago
- A tool to check the security settings of Github Organizations.β72Updated 2 years ago
- A documentation and tracking project with the goal of making package management systems more secure.β51Updated 4 years ago
- π§ͺ Correlate Semgrep scans with Python test coverage to prioritize SAST findings and get bug fix suggestions via a self-hosted LLM.β40Updated 8 months ago
- Pin designs for security related itemsβ37Updated last year
- RedFlag uses AI to identify high-risk code changes. Run it in batch mode for release candidate testing or in CI pipelines to flag PRs andβ¦β152Updated 9 months ago
- A community collection of security reviews of open source software components.β95Updated last year
- π π½ analyzes your github actionsβ93Updated last week
- Presentations, training modules, and other education materials from Duo Security's Application Security team.β75Updated 4 years ago
- Gram is Klarna's own threat model diagramming toolβ324Updated last month
- The OpenSSF CVE Benchmark consists of code and metadata for over 200 real life CVEs, as well as tooling to analyze the vulnerable codebasβ¦β151Updated last year
- β121Updated this week
- This repository stores content that can be used to design a Rapid Threat Model Prototyping process for a software development group.β163Updated 2 years ago
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrixβ58Updated last year
- Demonstrates how a malicious dependency could negatively impact the build output.β24Updated 2 years ago
- β124Updated last year
- Semgrep rules corresponding to the OWASP ASVS standardβ27Updated 4 years ago
- β372Updated last year
- threatspec - continuous threat modeling, through codeβ366Updated 4 years ago
- The Security Champion Framework provides both a measuring stick and a roadmap generator for Champion Programs.β108Updated last year
- Reapsaw is a continuous security devsecops tool, which helps in enabling security into CI/CD Pipeline. It supports coverage for multiple β¦β41Updated 4 years ago
- β35Updated 4 years ago
- A tool to automatically build a dependency graph and Software Bill of Materials (SBOM) for packages and arbitrary source code repositorieβ¦β368Updated last week
- drHEADer helps with the audit of security headers received in response to a single request or a list of requests.β110Updated 7 months ago