Basecamp¶
Built by KK Mookhey — Co-Founder of Transilience AI, the Full Stack Security OS.
Your foundation for AI + Cybersecurity¶
A curated map of the AI/cybersecurity intersection — 16 topics, 4 reading paths, every link hand-picked.
Every summit starts here. Whether you're building secure AI, governing AI risk, learning to attack AI systems, or applying AI to security work — this is where you gear up.
Pick a reading path¶
Basecamp organizes AI/cybersecurity learning by reader, not by topic. Pick the path that matches where you're starting from.
- → Practitioner — You want to build, break, and secure AI systems hands-on. Follow the full build → break → secure arc.
- → GRC & Leadership — You own AI risk, compliance, or governance. You need frameworks, controls, and incident response — not code.
- → Security pro learning AI — You know security cold. You want to translate AI/LLM/agent concepts into mental models you already have.
- → AI engineer learning security — You build models and ship agents. You need to start thinking adversarially.
Or browse by topic¶
Every link in Basecamp has exactly one home. The topics are grouped below; the glossary and books list sit under Reference.
Security of AI¶
- Foundations — mental model for transformers, RAG, agents, and MCP
- Building LLM Apps & Agents — frameworks, RAG patterns, agent architectures
- Model Context Protocol — spec, implementations, security posture
- Prompt Injection & Jailbreaks — direct, indirect, multi-turn, defenses
- LLM Vulnerabilities — OWASP LLM Top 10 2025, poisoning, supply chain
- Agentic AI Security — excessive agency, tool abuse, the rule of two
- AI Red Teaming — methodology and frameworks for adversarial evaluation
- Tooling for Attacking AI — PyRIT, Garak, DeepTeam, Promptfoo
- Governance & Compliance — NIST AI RMF, ISO 42001, EU AI Act
- AI Incident Response — playbooks, forensics, notification practice
AI for Security¶
- AI for SOC — alert triage, detection engineering, playbook automation
- AI for Pentesting — XBOW, Strix, Hexastrike, MCP-wrapped Kali/Burp
- AI for Vulnerability Management — prioritization, exposure, patch decisioning
- AI for GRC — policy authoring, control mapping, compliance automation
- AI for Threat Intelligence — IOC enrichment, actor profiling, feed triage
Research frontier¶
- Research Frontier — benchmarks, active papers, labs to follow
Reference¶
- Glossary — key terms, cross-linked to topics
- Books & Courses — long-form learning
How to contribute¶
See CONTRIBUTING.md for the quality bar, primary-source definition, and PR flow.
Not in scope¶
Basecamp deliberately does not cover general cybersecurity, general ML/data-science tutorials, or academic ML theory beyond what's needed for threat modeling. Full list in CONTRIBUTING.md#not-in-scope.
License¶
Content: CC BY 4.0. Code (tests, workflows, scripts): MIT.
Author¶
Curated by KK Mookhey. Feedback and PRs welcome.