subzer0girl2 / AI-Threat-Mind-MapLinks
☆42Updated 9 months ago
Alternatives and similar repositories for AI-Threat-Mind-Map
Users that are interested in AI-Threat-Mind-Map are comparing it to the libraries listed below
Sorting:
- ☆259Updated 2 weeks ago
- NOVA: The Prompt Pattern Matching☆173Updated last month
- ☆107Updated last year
- CALDERA plugin for adversary emulation of AI-enabled systems☆99Updated 2 years ago
- ☆309Updated last month
- ☆38Updated 8 months ago
- One Conference 2024☆110Updated 11 months ago
- Code Repository for: AIRTBench: Measuring Autonomous AI Red Teaming Capabilities in Language Models☆77Updated this week
- ☆68Updated this week
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆98Updated last year
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆56Updated 3 weeks ago
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆79Updated last year
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆102Updated last year
- ☆164Updated this week
- source code for the offsecml framework☆41Updated last year
- ☆12Updated 2 years ago
- Extracts IoCs, TTPs and the relationships between them. Outputs a STIX 2.1 bundle.☆67Updated last week
- Reference notes for Attacking and Defending Generative AI presentation☆65Updated last year
- Intel Retrieval Augmented Generation (RAG) Utilities☆90Updated last year
- ☆96Updated last month
- Curated list of Open Source project focused on LLM security☆62Updated 10 months ago
- Curated resources, research, and tools for securing AI systems☆80Updated this week
- Anvilogic Forge☆107Updated this week
- An LLM and OCR based Indicator of Compromise Extraction Tool☆35Updated 9 months ago
- ATLAS tactics, techniques, and case studies data☆79Updated last month
- An index of publicly available and open-source threat detection rulesets.☆124Updated 5 months ago
- Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogue…☆76Updated this week
- ☆47Updated last week
- Save toil in security operations with: Detection & Intelligence Analysis for New Alerts (D.I.A.N.A. )☆190Updated last year
- The Measure, Maximize, and Mature Threat-Informed Defense (M3TID) project defines what Threat-Informed Defense (TID) is and the key activ…☆16Updated 2 months ago