Awesome products for securing AI systems includes open source and commercial options and an infographic licensed CC-BY-SA-4.0.
☆85Jun 13, 2024Updated last year
Alternatives and similar repositories for awesome-security-for-ai
Users that are interested in awesome-security-for-ai are comparing it to the libraries listed below
Sorting:
- ☆56May 5, 2025Updated 10 months ago
- An example repo demonstrating keyless signing with Github Actions☆11May 24, 2022Updated 3 years ago
- Use a LLM to create the ultimate Leek AI for Leek Wars! 🥬☆16May 2, 2024Updated last year
- LLM | Security | Operations in one github repo with good links and pictures.☆94Feb 9, 2026Updated last month
- Sample Rust Hooking Engine☆36Apr 5, 2024Updated last year
- Simple reverse ICMP shell☆14Apr 30, 2024Updated last year
- Erebus is a payload generator written in Nim.☆17Jun 13, 2023Updated 2 years ago
- A custom SentinelOne USB scanner.☆19Mar 26, 2022Updated 3 years ago
- IronSharpPack is a repo of popular C# projects that have been embedded into IronPython scripts that execute an AMSI bypass and then refle…☆118May 2, 2024Updated last year
- excrypto offers specialized versions of the Go crypto, TLS, x509, and SSH packages designed for security research.☆15Mar 9, 2026Updated last week
- The OWASP Top 5 Machine Learning Risks[edit | edit source] The idea is to build the required resources which help software security comm…☆30Jun 9, 2018Updated 7 years ago
- A library for interacting with Windows through SMB written in Nim.☆17Sep 14, 2025Updated 6 months ago
- A collection of sample code used in some experiments with Sliver C2☆16Mar 28, 2023Updated 2 years ago
- Use GZip to compress your .NET assemblies for loading with AssemblyResolve.☆20Apr 11, 2014Updated 11 years ago
- A Large Action Model designed to operate on MacOS or Windows which interacts with common C2 interfaces such as Cobalt Strike, Havoc, or B…☆26Feb 29, 2024Updated 2 years ago
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆43Apr 23, 2024Updated last year
- Experiments with Google Gemini's Vision capabilities for LLM driven/aided web navigation and desktop manipulation☆31Jan 22, 2025Updated last year
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Jul 13, 2022Updated 3 years ago
- Generative web directory fuzzer,crawling and subdomain checker based on chatgpt☆16May 15, 2024Updated last year
- Unofficial Iranian hackers group disk wiper malware aka "Shamoon" in .NET 2.0☆13Dec 23, 2018Updated 7 years ago
- ☆13Jun 15, 2024Updated last year
- VisAST: Building and visualising Abstract Syntax Trees for Python code.☆16Nov 9, 2023Updated 2 years ago
- A utility to inspect, validate, sign and verify machine learning model files.☆67Feb 5, 2025Updated last year
- Bundle of security analysis scripts for keras tensorflow models☆16Apr 15, 2024Updated last year
- AI Security Research☆15Jun 21, 2023Updated 2 years ago
- A Collection of Awesome Personal Search Engines and Related Projects☆20Jan 10, 2023Updated 3 years ago
- DJI Drone Control Hijacking☆42Sep 13, 2023Updated 2 years ago
- Asynchronous NFSv3 client in pure Python☆28Jul 16, 2025Updated 8 months ago
- A security-first linter for code that shouldn't need linting☆18Sep 12, 2023Updated 2 years ago
- collection of beacon object file (Cobalt strike)☆12Jan 21, 2023Updated 3 years ago
- Miscellaneous examples for use with Cobalt Strike Beacon☆10Nov 19, 2020Updated 5 years ago
- Watches the Downloads folder for any new files and inserts it into Nemesis for analysis.☆15Feb 29, 2024Updated 2 years ago
- A BOF for enumerating version information for DLLs associated for a Beacon process.☆16Nov 23, 2021Updated 4 years ago
- SATO is a PowerShell tool focuses on providing flexible, multi-grant type support for obtaining, managing, and analyzing Azure tokens.☆22Nov 24, 2025Updated 3 months ago
- Brute Ratel LDAP filtering and sorting tool. Easily take BR log output and pull hostnames for ease of use with other red team tooling. Su…☆38Nov 16, 2023Updated 2 years ago
- malware written for educational purposes☆71Dec 31, 2025Updated 2 months ago
- A curated list of MLSecOps tools, articles and other resources on security applied to Machine Learning and MLOps systems.☆427Aug 1, 2025Updated 7 months ago
- A simple way to exfiltrate data using spotify API☆20Feb 11, 2026Updated last month
- Assorted BloodHound Cypher queries/tricks I haven't seen in other cheat sheets☆12Jun 21, 2021Updated 4 years ago