Skip to content

Basecamp

Built by KK Mookhey — Co-Founder of Transilience AI, the Full Stack Security OS.

Your foundation for AI + Cybersecurity

A curated map of the AI/cybersecurity intersection — 16 topics, 4 reading paths, every link hand-picked.

Every summit starts here. Whether you're building secure AI, governing AI risk, learning to attack AI systems, or applying AI to security work — this is where you gear up.


Pick a reading path

Basecamp organizes AI/cybersecurity learning by reader, not by topic. Pick the path that matches where you're starting from.

  • → Practitioner — You want to build, break, and secure AI systems hands-on. Follow the full build → break → secure arc.
  • → GRC & Leadership — You own AI risk, compliance, or governance. You need frameworks, controls, and incident response — not code.
  • → Security pro learning AI — You know security cold. You want to translate AI/LLM/agent concepts into mental models you already have.
  • → AI engineer learning security — You build models and ship agents. You need to start thinking adversarially.

Or browse by topic

Every link in Basecamp has exactly one home. The topics are grouped below; the glossary and books list sit under Reference.

Security of AI

  1. Foundations — mental model for transformers, RAG, agents, and MCP
  2. Building LLM Apps & Agents — frameworks, RAG patterns, agent architectures
  3. Model Context Protocol — spec, implementations, security posture
  4. Prompt Injection & Jailbreaks — direct, indirect, multi-turn, defenses
  5. LLM Vulnerabilities — OWASP LLM Top 10 2025, poisoning, supply chain
  6. Agentic AI Security — excessive agency, tool abuse, the rule of two
  7. AI Red Teaming — methodology and frameworks for adversarial evaluation
  8. Tooling for Attacking AI — PyRIT, Garak, DeepTeam, Promptfoo
  9. Governance & Compliance — NIST AI RMF, ISO 42001, EU AI Act
  10. AI Incident Response — playbooks, forensics, notification practice

AI for Security

  1. AI for SOC — alert triage, detection engineering, playbook automation
  2. AI for Pentesting — XBOW, Strix, Hexastrike, MCP-wrapped Kali/Burp
  3. AI for Vulnerability Management — prioritization, exposure, patch decisioning
  4. AI for GRC — policy authoring, control mapping, compliance automation
  5. AI for Threat Intelligence — IOC enrichment, actor profiling, feed triage

Research frontier

  1. Research Frontier — benchmarks, active papers, labs to follow

Reference

How to contribute

See CONTRIBUTING.md for the quality bar, primary-source definition, and PR flow.

Not in scope

Basecamp deliberately does not cover general cybersecurity, general ML/data-science tutorials, or academic ML theory beyond what's needed for threat modeling. Full list in CONTRIBUTING.md#not-in-scope.

License

Content: CC BY 4.0. Code (tests, workflows, scripts): MIT.

Author

Curated by KK Mookhey. Feedback and PRs welcome.