subzer0girl2 / AI-Threat-Mind-MapLinks
☆43Updated 10 months ago
Alternatives and similar repositories for AI-Threat-Mind-Map
Users that are interested in AI-Threat-Mind-Map are comparing it to the libraries listed below
Sorting:
- ☆268Updated 2 months ago
- Code Repository for: AIRTBench: Measuring Autonomous AI Red Teaming Capabilities in Language Models☆83Updated last week
- ☆38Updated 10 months ago
- CALDERA plugin for adversary emulation of AI-enabled systems☆103Updated 2 years ago
- One Conference 2024☆110Updated last year
- NOVA: The Prompt Pattern Matching☆25Updated last week
- ☆108Updated last year
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆57Updated 2 months ago
- ☆321Updated last month
- AI Security Shared Responsibility Model☆81Updated last month
- ☆166Updated last month
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆101Updated last year
- An experimental project using LLM technology to generate security documentation for Open Source Software (OSS) projects☆34Updated 8 months ago
- source code for the offsecml framework☆42Updated last year
- ☆41Updated 11 months ago
- ☆91Updated last week
- Knowledge base on cybercriminal concealment techniques☆78Updated 5 months ago
- A comprehensive GenAI protection system designed to protect against malicious prompts, injection attacks, and harmful content. System inc…☆92Updated 2 weeks ago
- ☆98Updated 2 months ago
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆79Updated last year
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆102Updated last year
- ☆116Updated 5 months ago
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆94Updated 2 weeks ago
- Repository of tools and resources for analyzing Docker containers☆70Updated last year
- Examine Chrome extensions for security issues☆85Updated 2 months ago
- Curated resources, research, and tools for securing AI systems☆156Updated this week
- LLM Testing Findings Templates☆74Updated last year
- Intel Retrieval Augmented Generation (RAG) Utilities☆90Updated last year
- A comprehensive knowledge base for security professionals to keep track of and build defenses against API attack techniques.☆43Updated last year
- The Measure, Maximize, and Mature Threat-Informed Defense (M3TID) project defines what Threat-Informed Defense (TID) is and the key activ…☆16Updated 4 months ago