subzer0girl2 / AI-Threat-Mind-MapLinks
☆42Updated 8 months ago
Alternatives and similar repositories for AI-Threat-Mind-Map
Users that are interested in AI-Threat-Mind-Map are comparing it to the libraries listed below
Sorting:
- ☆105Updated last year
- ☆258Updated 7 months ago
- CALDERA plugin for adversary emulation of AI-enabled systems☆99Updated 2 years ago
- NOVA: The Prompt Pattern Matching☆164Updated last month
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆97Updated last year
- ☆94Updated 3 weeks ago
- One Conference 2024☆111Updated 10 months ago
- Code Repository for: AIRTBench: Measuring Autonomous AI Red Teaming Capabilities in Language Models☆74Updated this week
- Intel Retrieval Augmented Generation (RAG) Utilities☆90Updated last year
- ☆38Updated 8 months ago
- ☆303Updated last month
- Jupyter Univere is a search engine for all infosec jupyter notebooks☆28Updated 5 months ago
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆56Updated this week
- source code for the offsecml framework☆41Updated last year
- ☆113Updated 3 months ago
- Extracts IoCs, TTPs and the relationships between them. Outputs a STIX 2.1 bundle.☆66Updated this week
- Knowledge base on cybercriminal concealment techniques☆76Updated 3 months ago
- ☆65Updated this week
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆78Updated last year
- Repository of tools and resources for analyzing Docker containers☆67Updated last year
- TTPMapper is an AI-driven threat intelligence parser that converts unstructured reports whether from web URLs or PDF files into structure…☆44Updated 2 months ago
- An index of publicly available and open-source threat detection rulesets.☆122Updated 4 months ago
- ATLAS tactics, techniques, and case studies data☆77Updated 2 weeks ago
- Simple Workspace Attack Tool (SWAT) is a tool for simulating malicious behavior against Google Workspace in reference to the MITRE ATT&CK…☆164Updated 10 months ago
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆103Updated 10 months ago
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆122Updated last year
- The Measure, Maximize, and Mature Threat-Informed Defense (M3TID) project defines what Threat-Informed Defense (TID) is and the key activ…☆16Updated 2 months ago
- Open Threat Hunting Framework☆118Updated 2 years ago
- Reference notes for Attacking and Defending Generative AI presentation☆64Updated last year
- This directory features proven systems that demonstrate value to your threat-informed efforts using metrics.☆113Updated 9 months ago