☆43Dec 12, 2024Updated last year
Alternatives and similar repositories for AI-Threat-Mind-Map
Users that are interested in AI-Threat-Mind-Map are comparing it to the libraries listed below
Sorting:
- LobotoMl is a set of scripts and tools to assess production deployments of ML services☆10May 16, 2022Updated 3 years ago
- Unofficial Iranian hackers group disk wiper malware aka "Shamoon" in .NET 2.0☆13Dec 23, 2018Updated 7 years ago
- ☆13Jun 15, 2024Updated last year
- AI Security Research☆15Jun 21, 2023Updated 2 years ago
- OWASP Foundation Web Respository☆26Dec 22, 2025Updated 2 months ago
- AI fun☆27Feb 27, 2025Updated last year
- Repo containing documentation and explanation for CSET's harm taxonomy of incidents from AIID.☆19Jun 21, 2024Updated last year
- InfoSec OpenAI Examples☆19Nov 26, 2023Updated 2 years ago
- Links and guidance related to the return on mitigation report in the Microsoft Digital Defense Report☆28Oct 10, 2023Updated 2 years ago
- A collection of sample code used in some experiments with Sliver C2☆16Mar 28, 2023Updated 2 years ago
- A powerful Burp Suite extension that imports Postman collections☆31Aug 1, 2025Updated 7 months ago
- Python script to walk a folder or a zip file for SQLite Databases☆37Sep 20, 2023Updated 2 years ago
- Generative web directory fuzzer,crawling and subdomain checker based on chatgpt☆16May 15, 2024Updated last year
- CVE-2023-50254: PoC Exploit for Deepin-reader RCE that affects unpatched Deepin Linux Desktops. Deepin Linux's default document reader "d…☆16Dec 22, 2023Updated 2 years ago
- Bundle of security analysis scripts for keras tensorflow models☆16Apr 15, 2024Updated last year
- A security-first linter for code that shouldn't need linting☆18Sep 12, 2023Updated 2 years ago
- A Cybersecurity Generalist LLM (ICLR'26)☆36Feb 9, 2026Updated last month
- exploiting and defending neural networks(神经网络攻防专栏)☆15Mar 2, 2021Updated 5 years ago
- A low-cost approach to testing AI chat experiences and security concepts☆40Jul 23, 2025Updated 7 months ago
- ☆12Oct 9, 2022Updated 3 years ago
- Utilities for decrypting and hashing SolarWinds Orion credentials☆14Oct 25, 2018Updated 7 years ago
- Test of http://www.malwaredomainlist.com/hostslist/hosts.txt☆14Updated this week
- Notes some analysis related to VidarStealer sample☆16May 5, 2024Updated last year
- ☆13Sep 10, 2025Updated 6 months ago
- Detecting and Responding to Threats using Microsoft 365 Defender, published by Packt☆16Jul 10, 2023Updated 2 years ago
- Sample notebook for Sensitive Data Protection of Generative AI on Google Cloud