subzer0girl2 / AI-Threat-Mind-Map
☆15Updated 4 months ago
Related projects: ⓘ
- ☆95Updated 3 months ago
- ☆158Updated last month
- OWASP Machine Learning Security Top 10 Project☆69Updated last week
- CALDERA plugin for adversary emulation of AI-enabled systems☆82Updated last year
- ☆69Updated 3 months ago
- A collection of agents that use Large Language Models (LLMs) to perform tasks common on our day to day jobs in cyber security.☆38Updated 4 months ago
- Payloads for Attacking Large Language Models☆56Updated 2 months ago
- A collection of awesome resources related AI security☆107Updated 5 months ago
- Code for shelLM tool☆41Updated 9 months ago
- A collection of prompt injection mitigation techniques.☆15Updated last year
- Secure Jupyter Notebooks and Experimentation Environment☆52Updated last month
- The project serves as a strategic advisory tool, capitalizing on the ZySec series of AI models to amplify the capabilities of security pr…☆28Updated 4 months ago
- Delving into the Realm of LLM Security: An Exploration of Offensive and Defensive Tools, Unveiling Their Present Capabilities.☆143Updated 11 months ago
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆68Updated 9 months ago
- ATLAS tactics, techniques, and case studies data☆46Updated 2 months ago
- An AI-powered tool for discovering privilege escalation opportunities in AWS IAM configurations.☆93Updated 2 months ago
- A LLM explicitly designed for getting hacked☆121Updated last year
- ☆11Updated last year
- ☆11Updated last year
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆64Updated 4 months ago
- source code for the offsecml framework☆30Updated 3 months ago
- A CLI wrapper for libmodsecurity (v3.0.10)☆11Updated 9 months ago
- LLM Testing Findings Templates☆65Updated 7 months ago
- An LLM and OCR based Indicator of Compromise Extraction Tool☆28Updated 5 months ago
- an extension for Burp Suite to allow researchers to utilize GPT for analys is of HTTP requests and responses☆89Updated last year
- Risks and targets for assessing LLMs & LLM vulnerabilities☆24Updated 3 months ago
- Intel Retrieval Augmented Generation (RAG) Utilities☆86Updated 7 months ago
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆55Updated last year
- Vulnerability Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streaml…☆95Updated this week
- Merge of two major cyber adversary datasets, MITRE ATT&CK and ETDA/ThaiCERT Threat Actor Cards, enabling victim/motivation-adversary-tech…☆50Updated 2 years ago