subzer0girl2 / AI-Threat-Mind-MapView external linksLinks
☆44Dec 12, 2024Updated last year
Alternatives and similar repositories for AI-Threat-Mind-Map
Users that are interested in AI-Threat-Mind-Map are comparing it to the libraries listed below
Sorting:
- LobotoMl is a set of scripts and tools to assess production deployments of ML services☆10May 16, 2022Updated 3 years ago
- ☆12Jun 15, 2024Updated last year
- Unofficial Iranian hackers group disk wiper malware aka "Shamoon" in .NET 2.0☆13Dec 23, 2018Updated 7 years ago
- AI Security Research☆15Jun 21, 2023Updated 2 years ago
- AI fun☆27Feb 27, 2025Updated 11 months ago
- ☆23Feb 2, 2026Updated 2 weeks ago
- A LLM explicitly designed for getting hacked☆166Aug 2, 2023Updated 2 years ago
- OWASP Foundation Web Respository☆26Dec 22, 2025Updated last month
- A Benchmark Tool for Natural Language-based Network Management☆29Jun 18, 2024Updated last year
- Do you want to learn AI Security but don't know where to start ? Take a look at this map.☆29Apr 23, 2024Updated last year
- Task management for small-group organizers.☆18Jul 23, 2022Updated 3 years ago
- A collection of prompt injection mitigation techniques.☆27Aug 19, 2023Updated 2 years ago
- polish fuzzy lop - fuzzer for libraries/APIs/*☆31Jul 30, 2025Updated 6 months ago
- Links and guidance related to the return on mitigation report in the Microsoft Digital Defense Report☆28Oct 10, 2023Updated 2 years ago
- ☆10Updated this week
- Flowlyt is a security analyzer that scans GitHub Actions workflows to detect malicious patterns, misconfigurations, and secrets exposure,…☆15Feb 10, 2026Updated last week
- OWASP Foundation Web Respository☆350Updated this week
- Python script to walk a folder or a zip file for SQLite Databases☆37Sep 20, 2023Updated 2 years ago
- Scripts & Code patches for analyzing/emulating/copying FM1208 CPU Cards (读取复制 SAK28 CPU卡 FM1208)☆19Mar 7, 2025Updated 11 months ago
- You can use it to modify HTTP (S) response values, redirect static file requests to the local file directory, and support batch modificat…☆18Nov 30, 2022Updated 3 years ago
- ☆14Jan 27, 2026Updated 3 weeks ago
- User Feedback Space of #MitreAssistant☆38May 19, 2023Updated 2 years ago
- Static site for big five personality tests☆10Updated this week
- MISP to Microsoft Defender integration☆16Feb 6, 2026Updated last week
- A Streamlit-based chatbot application using Gemini models for NLP. Features include light/dark mode toggle, model selection (Gemini 1.5 F…☆10May 23, 2024Updated last year
- Mindmap for OWASP Top 10 LLM Application and Relationship between them☆13Dec 11, 2024Updated last year
- Content Moderation using Reality.Eth with Kleros arbitration☆12Feb 19, 2025Updated 11 months ago
- Detecting and Responding to Threats using Microsoft 365 Defender, published by Packt☆16Jul 10, 2023Updated 2 years ago
- Rapid Response sample Foundry app☆14Updated this week
- Threat Hunting with Elastic Stack, Published by Packt☆40Jan 18, 2023Updated 3 years ago
- Manual Prompt Injection / Red Teaming Tool☆52Oct 5, 2024Updated last year
- Literate programmiong parser in C☆10Mar 21, 2013Updated 12 years ago
- LLM Security Guard for Code☆20Sep 8, 2024Updated last year
- ☆10Jul 5, 2023Updated 2 years ago
- Pangea Multipass is the authorization checker for systems like Google Workspace, Jira, and more.☆14Dec 24, 2025Updated last month
- eXokernel Development Kit for Linux☆14Jan 6, 2017Updated 9 years ago
- Notes some analysis related to VidarStealer sample☆17May 5, 2024Updated last year
- A minimalistic popup calendar☆10Jul 30, 2023Updated 2 years ago
- A Model Context Protocol (MCP) server that enables AI assistants to control Keynote presentations through AppleScript automation.☆33Jul 6, 2025Updated 7 months ago