subzer0girl2 / AI-Threat-Mind-Map
☆20Updated 2 months ago
Related projects ⓘ
Alternatives and complementary repositories for AI-Threat-Mind-Map
- A collection of prompt injection mitigation techniques.☆18Updated last year
- Code for shelLM tool☆46Updated 3 weeks ago
- ☆99Updated 5 months ago
- CALDERA plugin for adversary emulation of AI-enabled systems☆85Updated last year
- ☆185Updated this week
- Data Scientists Go To Jupyter☆57Updated this week
- ATLAS tactics, techniques, and case studies data☆49Updated last month
- ☆74Updated this week
- future-proof vulnerability detection benchmark, based on CVEs in open-source repos☆44Updated last week
- Explore AI Supply Chain Risk with the AI Risk Database☆50Updated 6 months ago
- ☆94Updated last month
- InfoSec OpenAI Examples☆19Updated 11 months ago
- AI featured threat modeling and security review action☆40Updated this week
- Secure Jupyter Notebooks and Experimentation Environment☆56Updated last month
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆68Updated 6 months ago
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆75Updated 11 months ago
- A collection of awesome resources related AI security☆131Updated 8 months ago
- source code for the offsecml framework☆35Updated 5 months ago
- A collection of agents that use Large Language Models (LLMs) to perform tasks common on our day to day jobs in cyber security.☆56Updated 6 months ago
- Intel Retrieval Augmented Generation (RAG) Utilities☆88Updated 9 months ago
- Tree of Attacks (TAP) Jailbreaking Implementation☆95Updated 9 months ago
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆44Updated 3 weeks ago
- OWASP Machine Learning Security Top 10 Project☆76Updated 2 months ago
- Delving into the Realm of LLM Security: An Exploration of Offensive and Defensive Tools, Unveiling Their Present Capabilities.☆149Updated last year
- Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogue…☆43Updated last month
- ☆11Updated last year
- Payloads for Attacking Large Language Models☆64Updated 4 months ago
- An LLM and OCR based Indicator of Compromise Extraction Tool☆31Updated 7 months ago
- ForgeArmory provides TTPs that can be used with the TTPForge (https://github.com/facebookincubator/ttpforge).☆93Updated 2 months ago
- AI featured threat modeling and security review project☆12Updated this week