subzer0girl2 / AI-Threat-Mind-Map
☆39Updated 5 months ago
Alternatives and similar repositories for AI-Threat-Mind-Map
Users that are interested in AI-Threat-Mind-Map are comparing it to the libraries listed below
Sorting:
- ☆40Updated last week
- ☆36Updated 4 months ago
- ☆104Updated 11 months ago
- NOVA: The Prompt Pattern Matching☆80Updated 2 weeks ago
- An experimental project using LLM technology to generate security documentation for Open Source Software (OSS) projects☆28Updated 2 months ago
- One Conference 2024☆110Updated 7 months ago
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆75Updated last year
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆87Updated last year
- CALDERA plugin for adversary emulation of AI-enabled systems☆96Updated last year
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆53Updated 2 months ago
- A comprehensive knowledge base for security professionals to keep track of and build defenses against API attack techniques.☆43Updated 8 months ago
- Curated list of Open Source project focused on LLM security☆42Updated 6 months ago
- An index of publicly available and open-source threat detection rulesets.☆72Updated last month
- ☆89Updated this week
- Intelligence around common attacker behaviors (MITRE ATT&CK TTPs), in the form of ATT&CK Navigator "layer" json files.☆35Updated 2 years ago
- Data from Dark Web Marketplace scraping - Be careful☆39Updated 6 months ago
- The Measure, Maximize, and Mature Threat-Informed Defense (M3TID) project defines what Threat-Informed Defense (TID) is and the key activ…☆16Updated last month
- Intel Retrieval Augmented Generation (RAG) Utilities☆91Updated last year
- Examine Chrome extensions for security issues☆81Updated 2 months ago
- This provides a guided step by step walkthrough for threat modeling with MITRE ATT&CK Framework☆28Updated 3 months ago
- An LLM and OCR based Indicator of Compromise Extraction Tool☆33Updated 5 months ago
- LLM Testing Findings Templates☆72Updated last year
- ☆11Updated last year
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.☆51Updated 6 months ago
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆88Updated 6 months ago
- Knowledge base on cybercriminal concealment techniques☆64Updated last week
- Jupyter Univere is a search engine for all infosec jupyter notebooks☆26Updated last month
- ☆103Updated this week
- Cloud Analytics helps defenders detect attacks to their cloud infrastructure by developing behavioral analytics for cloud platforms as we…☆53Updated 2 years ago
- Extracts IoCs, TTPs and the relationships between them. Outputs a STIX 2.1 bundle.☆54Updated last week