sans-community / ai-guidelinesLinks
☆26Updated 2 months ago
Alternatives and similar repositories for ai-guidelines
Users that are interested in ai-guidelines are comparing it to the libraries listed below
Sorting:
- One Conference 2024☆110Updated 11 months ago
- Halberd : Multi-Cloud Agentic Attack Tool☆309Updated 2 weeks ago
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆209Updated this week
- ☆309Updated last month
- When Your Vision Reaches Beyond IAM Boundary Scope in AWS Cloud☆39Updated last month
- A curated list of LLM driven Cyber security Resources☆36Updated 3 months ago
- A full insecure kubernetes application for testing security tools☆89Updated 4 months ago
- Generate a matrix based on an inventory of InfoSec tools☆23Updated last year
- NOVA: The Prompt Pattern Matching☆173Updated last month
- Use AI to Scan Your Code from the Command Line for security and code smells. Bring your own keys. Supports OpenAI and Gemini☆174Updated 4 months ago
- Playbook-NG is a stateless web-based application used to match incident findings with countermeasures for adversary containment and evict…☆138Updated last month
- Cybether - A modern, open-source Cybersecurity Governance, Risk, and Compliance (GRC) dashboard☆81Updated 2 weeks ago
- A collection of companies that disclose adversary TTPs after they have been breached☆245Updated last year
- OWASP Foundation web repository☆397Updated last week
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆91Updated 2 weeks ago
- Save toil in security operations with: Detection & Intelligence Analysis for New Alerts (D.I.A.N.A. )☆190Updated last year
- AWS audits, without screenshots☆26Updated last month
- Maturity models help integrate traditionally separate organizational functions, set process improvement goals and priorities, provide gui…☆253Updated 2 months ago
- AIGoat: A deliberately Vulnerable AI Infrastructure. Learn AI security through solving our challenges.☆250Updated this week
- NIST CSF Maturity Toolkit☆102Updated 3 months ago
- An index of publicly available and open-source threat detection rulesets.☆124Updated 5 months ago
- BlackCat is a PowerShell module designed to validate the security of Microsoft Azure. It provides a set of functions to identify potentia…☆147Updated last week
- This repo contains IOC, malware and malware analysis associated with Public cloud☆249Updated 10 months ago
- A collection of Active Directory, phishing, mobile technology, system, service, web application, and wireless technology weaknesses that …☆251Updated 3 years ago
- An automated Breach and Attack Simulation lab with terraform. Built for IaC stability, consistency, and speed.☆196Updated last year
- ☆61Updated 3 months ago
- CloudGrappler is a purpose-built tool designed for effortless querying of high-fidelity and single-event detections related to well-known…☆262Updated 2 weeks ago
- Red Teaming for AI and Cloud☆196Updated 3 months ago
- Streamline vulnerability patching with CVSS, EPSS, and CISA's Known Exploited Vulnerabilities. Prioritize actions based on real-time thre…☆672Updated 2 months ago
- Gram is Klarna's own threat model diagramming tool☆325Updated last month