AiGptCode / Analysis-TCP-UDPLinks
This project implements a cybersecurity system for detecting anomalies and intrusions in network traffic. It utilizes machine learning models, network monitoring tools, and intrusion detection systems to monitor and respond to security threats in real-time.
☆16Updated last year
Alternatives and similar repositories for Analysis-TCP-UDP
Users that are interested in Analysis-TCP-UDP are comparing it to the libraries listed below
Sorting:
- This is a dataset intended to train a LLM model for a completely CVE focused input and output.☆64Updated 5 months ago
- ☆58Updated 3 months ago
- ☆21Updated last year
- Specific C2 Detection Tool Written To Detect C2 Servers From RisePro Stealer Malware.☆13Updated 2 years ago
- LLM powered agents for scanning vulnerabilities on any website - Llama 3 8B, Groq, Selenium, CrewAI, Exa AI☆28Updated last year
- SourceGPT - prompt manager and source code analyzer built on top of ChatGPT as the oracle☆109Updated 2 years ago
- 👽 The collection of awesome software, tools, libraries, documents, books, resources and cool stuff about information security, penetrati…☆26Updated 2 months ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆18Updated 3 years ago
- Autonomous Security Analysis and Penetration Testing☆24Updated 2 years ago
- AI-based Web Application Penetration Testing Tool☆22Updated last year
- MCP server for dnstwist, a powerful DNS fuzzing tool that helps detect typosquatting, phishing, and corporate espionage.☆38Updated 8 months ago
- A (not too) Evil Chatbot 👹☆58Updated 2 years ago
- An Interface for AI built for cybersecurity professionals☆92Updated 9 months ago
- Yet another OSINT automator.☆19Updated 5 years ago
- PersonaAI is a versatile tool designed to perform psychological profiling based on a person's Facebook ID.☆12Updated last year
- YAWNING TITAN is an abstract, graph based cyber-security simulation environment that supports the training of intelligent agents for auto…☆65Updated last year
- Pathbyter is a lightning fast proof-of-concept ransomware that uses RSA wrapped AES, multiprocessing, in memory key encryption, appends e…☆26Updated 2 years ago
- AI-Powered OSINT Image Analysis☆21Updated last year
- Cybersecurity Intelligent Pentesting Helper for Ethical Researcher (CIPHER). Fine tuned LLM for penetration testing guidance based on wri…☆33Updated 10 months ago
- This tool helps new security professionals actively learn how to address security concerns associated with open ports on a network device…☆22Updated 8 months ago
- A collection of awesome framework, libraries, learning tutorials, videos, webcasts, technical resources and cool stuff about Social Engin…☆20Updated 3 years ago
- GPT-3 use cases for Cybersecurity☆52Updated 2 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆13Updated 2 years ago
- awsome kali MCPServers is a set of MCP servers tailored for Kali Linux☆76Updated 7 months ago
- The script uses an Google maps API to download photos of places in the area specified by coordinates and search radius☆21Updated 2 years ago
- CloudDefense.ai is an automated web application security testing tool that audits your web applications by checking for vulnerabilities l…☆50Updated last week
- Assembler tinkering happens here. All your bytes are belong to us.☆13Updated 8 years ago
- https://arxiv.org/abs/2412.02776☆66Updated 11 months ago
- A collection of hardware Trojans (HTs) automatically generated by Large Language Models (GPT-4, Gemini-1.5-pro, and LLaMA3) targeting SRA…☆11Updated last month
- ☆41Updated 8 months ago