subzer0girl2 / AI-Threat-Mind-MapLinks
☆42Updated 11 months ago
Alternatives and similar repositories for AI-Threat-Mind-Map
Users that are interested in AI-Threat-Mind-Map are comparing it to the libraries listed below
Sorting:
- ☆108Updated last year
- ☆277Updated 3 months ago
- One Conference 2024☆111Updated last year
- NOVA: The Prompt Pattern Matching☆57Updated last month
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆81Updated last year
- CALDERA plugin for adversary emulation of AI-enabled systems☆105Updated 2 years ago
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆103Updated last year
- Code Repository for: AIRTBench: Measuring Autonomous AI Red Teaming Capabilities in Language Models☆90Updated last week
- An experimental project using LLM technology to generate security documentation for Open Source Software (OSS) projects☆34Updated 9 months ago
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆98Updated last month
- ☆100Updated last month
- Code that implements Factor Analysis of Information Risk (FAIR) in combination with MITRE ATT&CK using Markov Chain Monte Carlo (via PyMC…☆42Updated 2 weeks ago
- ☆343Updated 2 months ago
- ☆38Updated 11 months ago
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆213Updated this week
- ☆166Updated 2 months ago
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆101Updated last year
- Extracts IoCs, TTPs and the relationships between them. Outputs a STIX 2.1 bundle.☆77Updated this week
- source code for the offsecml framework☆43Updated last year
- Save toil in security operations with: Detection & Intelligence Analysis for New Alerts (D.I.A.N.A. )☆222Updated last year
- Intel Retrieval Augmented Generation (RAG) Utilities☆91Updated last year
- AI Security Shared Responsibility Model☆85Updated 2 months ago
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆60Updated 3 weeks ago
- Reference notes for Attacking and Defending Generative AI presentation☆67Updated last year
- Intelligence around common attacker behaviors (MITRE ATT&CK TTPs), in the form of ATT&CK Navigator "layer" json files.☆35Updated 3 years ago
- Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogue…☆84Updated 2 weeks ago
- LLM Testing Findings Templates☆75Updated last year
- ☆41Updated last year
- Collection of Jupyter Notebooks by @fr0gger_☆185Updated 2 months ago
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆125Updated 2 years ago