subzer0girl2 / AI-Threat-Mind-MapLinks
☆44Updated last year
Alternatives and similar repositories for AI-Threat-Mind-Map
Users that are interested in AI-Threat-Mind-Map are comparing it to the libraries listed below
Sorting:
- Code Repository for: AIRTBench: Measuring Autonomous AI Red Teaming Capabilities in Language Models☆92Updated last week
- ☆283Updated 4 months ago
- CALDERA plugin for adversary emulation of AI-enabled systems☆108Updated 2 years ago
- NOVA: The Prompt Pattern Matching☆64Updated 2 months ago
- One Conference 2024☆111Updated last year
- ☆38Updated last year
- ☆108Updated last year
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆60Updated 2 months ago
- ☆129Updated this week
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆99Updated 3 months ago
- ☆357Updated 4 months ago
- source code for the offsecml framework☆44Updated last year
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆103Updated 2 years ago
- ATLAS tactics, techniques, and case studies data☆96Updated 3 weeks ago
- An experimental project using LLM technology to generate security documentation for Open Source Software (OSS) projects☆34Updated 10 months ago
- Reference notes for Attacking and Defending Generative AI presentation☆69Updated last year
- LLM Testing Findings Templates☆75Updated last year
- The Art of Pivoting - Techniques for Intelligence Analysts to Discover New Relationships in a Complex World☆146Updated 2 weeks ago
- ☆41Updated last year
- Intel Retrieval Augmented Generation (RAG) Utilities☆91Updated last year
- Extracts IoCs, TTPs and the relationships between them. Outputs a STIX 2.1 bundle.☆79Updated this week
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆82Updated last year
- ☆101Updated last month
- Code that implements Factor Analysis of Information Risk (FAIR) in combination with MITRE ATT&CK using Markov Chain Monte Carlo (via PyMC…☆44Updated last month
- Jupyter Univere is a search engine for all infosec jupyter notebooks☆34Updated 9 months ago
- An LLM and OCR based Indicator of Compromise Extraction Tool☆38Updated last year
- ☆169Updated 3 months ago
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆101Updated 2 years ago
- Delving into the Realm of LLM Security: An Exploration of Offensive and Defensive Tools, Unveiling Their Present Capabilities.☆166Updated 2 years ago
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆215Updated this week