subbyte's Stars
stanfordnlp/dspy
DSPy: The framework for programming—not prompting—foundation models
Yelp/detect-secrets
An enterprise friendly way of detecting and preventing secrets in code.
llm-attacks/llm-attacks
Universal and Transferable Attacks on Aligned Language Models
rtfeldman/elm-spa-example
A Single Page Application written in Elm
olafhartong/sysmon-modular
A repository of sysmon configuration modules
pingcap/ossinsight
Analysis, Comparison, Trends, Rankings of Open Source Software, you can also get insight from more than 7 billion with natural language (powered by OpenAI). Follow us on Twitter: https://twitter.com/ossinsight
yahoo/egads
A Java package to automatically detect anomalies in large scale time-series data
UKGovernmentBEIS/inspect_ai
Inspect: A framework for large language model evaluations
cmu-sei/GHOSTS
GHOSTS is a realistic user simulation framework for cyber experimentation, simulation, training, and exercise
Calysto/metakernel
Jupyter/IPython Kernel Tools
jgehrcke/github-repo-stats
GitHub Action for advanced repository traffic analysis and reporting
BishopFox/BrokenHill
A productionized greedy coordinate gradient (GCG) attack tool for large language models (LLMs)
Chadtech/CtPaint-Desktop
The non-paint app part of CtPaint
CrowdStrike/aws-security-lake
Integration guide for CrowdStrike and Amazon Security Lake
oasis-tcs/openc2-ap-hunt
OASIS OpenC2 TC: Developing an Actuator Profile to manage threat hunting activities. The AP will define the Actions, Targets, Specifiers and Options to manage Threat Hunting consistent with the OpenC2 Language Specification. https://github.com/oasis-tcs/openc2-ap-hunt