wearetyomsmnv / AI-LLM-ML_security_study_map
Do you want to learn AI Security but don't know where to start ? Take a look at this map.
☆20Updated 8 months ago
Alternatives and similar repositories for AI-LLM-ML_security_study_map:
Users that are interested in AI-LLM-ML_security_study_map are comparing it to the libraries listed below
- ☆26Updated 2 months ago
- LLM | Security | Operations in one github repo with good links and pictures.☆24Updated 2 weeks ago
- Project LLM Verification Standard☆37Updated 9 months ago
- ☆27Updated last month
- A security-first linter for code that shouldn't need linting☆16Updated last year
- OWASP Machine Learning Security Top 10 Project☆79Updated 4 months ago
- Dragon-GPT uses Chat-GPT, or local LLM, to execute automatic and AI-powered threat modeling analysis on a given OWASP Threat Dragon diagr…☆32Updated last year
- Risks and targets for assessing LLMs & LLM vulnerabilities☆30Updated 7 months ago
- An interactive CLI application for interacting with authenticated Jupyter instances.☆50Updated 10 months ago
- ☆62Updated last month
- ☆69Updated 10 months ago
- OWASP Top 10 for Agentic AI (AI Agent Security) - Pre-release version☆33Updated this week
- A collection of prompt injection mitigation techniques.☆20Updated last year
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆59Updated 6 months ago
- ☆22Updated 11 months ago
- Project Mantis: Hacking Back the AI-Hacker; Prompt Injection as a Defense Against LLM-driven Cyberattacks☆59Updated last month
- An open-source collection of API key rotation tutorials.☆63Updated last month
- Explore AI Supply Chain Risk with the AI Risk Database☆51Updated 8 months ago
- EZGHSA is a command-line tool for summarizing and filtering vulnerability alerts on Github repositories.☆35Updated 3 weeks ago
- source for llmsec.net☆13Updated 5 months ago
- A benchmark for prompt injection detection systems.☆94Updated 4 months ago
- Tool for obfuscating and deobfuscating data.☆67Updated 9 months ago
- ☆34Updated 2 weeks ago
- ☆32Updated 5 months ago
- Codebase of https://arxiv.org/abs/2410.14923☆35Updated 2 months ago
- ATHI — An AI Threat Modeling Framework for Policymakers☆47Updated last year
- Security tool against dependency typosquatting attacks☆39Updated this week
- Modular framework for file information extraction and dependency analysis to generate accurate SBOMs☆25Updated this week
- ☆33Updated last month
- Vulnerable by Design AWS Cloud Development Kit (CDK) Infrastructure☆46Updated last year