Do you want to learn AI Security but don't know where to start ? Take a look at this map.
☆29Apr 23, 2024Updated last year
Alternatives and similar repositories for AI-LLM-ML_security_study_map
Users that are interested in AI-LLM-ML_security_study_map are comparing it to the libraries listed below
Sorting:
- R.A.Y.D.E.R revolutionizes security testing for generative AI by letting you test chatbots directly through their web interfaces. No API …☆15Jul 23, 2025Updated 7 months ago
- LLM | Security | Operations in one github repo with good links and pictures.☆90Feb 9, 2026Updated 3 weeks ago
- ☆11Jun 7, 2025Updated 8 months ago
- Framework for testing vulnerabilities of large language models (LLM).☆200Jan 16, 2026Updated last month
- ☆31Sep 23, 2024Updated last year
- AIBOM Workshop RSA 2024☆15May 20, 2024Updated last year
- Hi, these are some scripts that i use whenever a mobile pentest task comes up . Hope they would be helpful for someone☆13Dec 14, 2023Updated 2 years ago
- The educational course dedicated to FOSS culture and toolchain☆20Aug 22, 2025Updated 6 months ago
- ☆20Jul 19, 2024Updated last year
- The official repository for guided jailbreak benchmark☆29Jul 28, 2025Updated 7 months ago
- ☆49Jan 20, 2026Updated last month
- SBOM Search - Context aware search in SBOM repositories☆29Nov 24, 2025Updated 3 months ago
- MCP Snitch is a macOS application that intercepts and monitors MCP server communications, providing security analysis, access control, an…☆93Oct 14, 2025Updated 4 months ago
- ☆10Dec 5, 2025Updated 2 months ago
- AI cover model for your own voice.☆34Aug 14, 2024Updated last year
- The source code of [WWW 2025] MoDiCF☆12Jul 12, 2025Updated 7 months ago
- ForgeRock Identity Cloud Debug Tools☆11Jan 27, 2023Updated 3 years ago
- Scripts & Code patches for analyzing/emulating/copying FM1208 CPU Cards (读取复制 SAK28 CPU卡 FM1208)☆19Mar 7, 2025Updated 11 months ago
- An extensive list of resources related to threat modelling. Gotta catch ’em all!☆42Feb 25, 2026Updated last week
- This toolkit guides you on implementing secure and user-friendly digital and in-person interactions. Whether you are a service owner, dev…☆10Nov 6, 2025Updated 3 months ago
- Our 1st place solution to finnet challenge☆10May 29, 2020Updated 5 years ago
- ☆34Nov 12, 2024Updated last year
- Framework for the automatic creation of CNN architectures☆38Nov 21, 2025Updated 3 months ago
- ☆101Feb 5, 2026Updated 3 weeks ago
- GreenLambert macOS IDA plugin to deobfuscate strings☆14Oct 4, 2021Updated 4 years ago
- ☆12Feb 10, 2026Updated 3 weeks ago
- Content Moderation using Reality.Eth with Kleros arbitration☆12Feb 19, 2025Updated last year
- Evaluation Pipeline for medical tasks.☆12Feb 13, 2026Updated 2 weeks ago
- Document intricacies of using WinDBG to aid Rust project development☆17Nov 19, 2024Updated last year
- Winning solution of the Microsoft Research "First TextWorld Problems: A Reinforcement and Language Learning Challenge"☆12Jun 21, 2022Updated 3 years ago
- CDbw Index For Cluster Validation☆10Mar 26, 2019Updated 6 years ago
- A curated list of 150+ papers and resources on Agentic Security. Based on the survey covering the transition from passive LLMs to autonom…☆28Dec 6, 2025Updated 2 months ago
- Program uses cv2 to display many streams from cameras, web pages, local files☆13Jan 31, 2021Updated 5 years ago
- Simple snippet database☆13Nov 19, 2024Updated last year
- The Pair App is employed by the Agency of Learning for team management and communication.☆10Apr 13, 2024Updated last year
- Простой нормализатор текстов перед синтезом речи☆45May 13, 2024Updated last year
- Removes spam messages from telegram channel discussions☆40Aug 27, 2024Updated last year
- Every practical and proposed defense against prompt injection.☆642Feb 22, 2025Updated last year
- ☆25Sep 3, 2025Updated 6 months ago