h4cker/ai_research
2025-01-26 21:18:58 -05:00
..
AI for Incident Response Create Dynamic_Obfuscation.md 2024-02-02 16:16:30 -05:00
ai_risk_management Update README.md 2024-08-29 22:14:00 -04:00
ethics_privacy Update README.md 2023-09-08 11:54:12 -04:00
fine-tuning Update README.md 2024-09-05 10:52:17 -04:00
GPTs Update README.md 2023-11-28 00:54:24 -05:00
labs Update README.md 2024-08-07 08:55:43 -07:00
LangChain Update README.md 2024-11-21 07:46:01 -05:00
LLM-frameworks Create README.md 2023-10-23 22:21:19 -04:00
ML_Fundamentals Update vector_databases.md 2024-08-18 15:49:45 -04:00
open-interpreter-examples Update secretcorp.md 2024-12-07 23:46:31 -05:00
prompt_engineering Add files via upload 2024-09-10 23:08:51 -04:00
prompt_injection Update README.md 2024-12-20 20:04:29 -05:00
RAG Update README.md 2024-08-18 20:11:07 -04:00
training_environment_security Create README.md 2024-09-21 22:21:25 -04:00
vector_databases Create README.md 2024-09-21 23:10:02 -04:00
ai_coding_tools.md Create ai_coding_tools.md 2024-06-26 12:37:27 -04:00
ai_security_tools.md Update ai_security_tools.md 2025-01-26 21:11:33 -05:00
datasets.rst Update datasets.rst 2024-01-04 11:47:49 -05:00
model_security_testing.md Update model_security_testing.md 2024-07-24 18:28:22 -04:00
monitoring.md Create monitoring.md 2024-01-05 12:53:41 -05:00
prompt_engineering.md Create prompt_engineering.md 2023-12-12 21:15:17 -05:00
README.md Update README.md 2025-01-26 21:18:16 -05:00

AI Security Research Resources

Langchain Resources

LLM Frameworks

Collection of Jupyter Notebooks

This is (by far) the best collection of colab notebooks I have found. A bit overwhelming and I wish I had time to go through most of them… Tons of links to papers, videos, etc.: https://github.com/amrzv/awesome-colab-notebooks

AI Security Best Practices and Tools

AI Security Resources from Omar's Training Sessions

This section provides a curated list of resources that delve into foundational cybersecurity concepts, frequently explored in my O'Reilly training sessions and other educational offerings.

Live Training

Upcoming Live Cybersecurity and AI Training in O'Reilly: Register before it is too late (free with O'Reilly Subscription)

Reading List

Despite the rapidly evolving landscape of AI and technology, these books offer a comprehensive roadmap for understanding the intersection of these technologies with cybersecurity:

  • Redefining Hacking A Comprehensive Guide to Red Teaming and Bug Bounty Hunting in an AI-driven World Available on O'Reilly

  • Developing Cybersecurity Programs and Policies in an AI-Driven World
    Explore strategies for creating robust cybersecurity frameworks in an AI-centric environment. Available on O'Reilly

  • Beyond the Algorithm: AI, Security, Privacy, and Ethics
    Gain insights into the ethical and security challenges posed by AI technologies. Available on O'Reilly

  • The AI Revolution in Networking, Cybersecurity, and Emerging Technologies Understand how AI is transforming networking and cybersecurity landscapes.
    Available on O'Reilly

Video Courses

Enhance your practical skills with these video courses designed to deepen your understanding of cybersecurity:


  • AI-Enabled Programming, Networking, and Cybersecurity Learn to use AI for cybersecurity, networking, and programming tasks. Use examples of practical, hands-on activities and demos that emphasize real-world tasks. Implement AI tools as a programmer, developer, networking, or security professional. Available on O'Reilly

  • Securing Generative AI Explore security for deploying and developing AI applications, RAG, agents, and other AI implementations Learn hands-on with practical skills of real-life AI and machine learning cases Incorporate security at every stage of AI development, deployment, and operation Available on O'Reilly

  • Practical Cybersecurity Fundamentals
    A comprehensive video course covering essential cybersecurity principles. Available on O'Reilly

  • The Art of Hacking
    A series of video courses offering over 26 hours of training in ethical hacking and penetration testing techniques. Ideal for those preparing for certifications like OSCP or CEH.
    Visit The Art of Hacking

AWESOME Lists