A curated list of tools, papers, and datasets for applying AI to cybersecurity tasks. This list primarily focuses on modern AI technologies like Large Language Models (LLMs), Agents, and Multi-Modal systems and their applications in security operations.
☆122Mar 24, 2026Updated 3 weeks ago
Alternatives and similar repositories for Awesome-AI-For-Security
Users that are interested in Awesome-AI-For-Security are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Security Blogs - A simple aggregator for security news/blog☆25Mar 31, 2026Updated 2 weeks ago
- Aqua Runtime Security POV Tool☆11Apr 18, 2025Updated 11 months ago
- An Agentic platform that allows you to define extensions☆26Jul 27, 2025Updated 8 months ago
- Automated remote exports (snapshots) for your Bitwarden vault☆10Jun 14, 2024Updated last year
- Terraform module to perform security assessment in AWS Organizations using Prowler on AWS Fargate.☆16Oct 5, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A small go harness that uses Ollama to orchestrate LLMs in a restricted process flow☆17Sep 10, 2024Updated last year
- A TensorFlow Implementation of Punctuation Restoration.☆18Nov 9, 2020Updated 5 years ago
- An extended version of SecureBERT, trained on top of both base and large version of RoBERTa using 10 GB cybersecurity-related data☆32Jan 26, 2024Updated 2 years ago
- List of groups that are carrying out cyber actions in the conflict between Israel and Iran.☆34Feb 12, 2026Updated 2 months ago
- CodemixedNLP: An Extensible and Open NLP Toolkit for Code-Switching☆18Mar 29, 2021Updated 5 years ago
- Data about all known supply-chain attacks through history☆65May 28, 2025Updated 10 months ago
- MCP Snitch is a macOS application that intercepts and monitors MCP server communications, providing security analysis, access control, an…☆93Oct 14, 2025Updated 6 months ago
- Point of Concept: To help to automate the collection of evidence for SOC 2 Audits and etc.☆11May 13, 2024Updated last year
- OWASP Web Security Testing Guide RAG system with ChromaDB, MCP for Claude Code☆20Dec 11, 2025Updated 4 months ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- The project serves as a strategic advisory tool, capitalizing on the ZySec series of AI models to amplify the capabilities of security pr…☆68May 19, 2024Updated last year
- My private CTF and learning write-ups☆22Jan 26, 2026Updated 2 months ago
- Use WEAT statistic to compare bias among word embeddings trained with different algorithms, from different sources, or after debiasing☆13May 28, 2019Updated 6 years ago
- ☆102Feb 5, 2026Updated 2 months ago
- MLOps Attack Toolkit☆31Aug 25, 2025Updated 7 months ago
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆106Oct 13, 2025Updated 6 months ago
- All about llm-agents security,attack,vulnerabilities and how to do them for cybersecurity.☆47Apr 8, 2026Updated last week
- ☆19May 17, 2025Updated 11 months ago
- ☆11Jun 7, 2025Updated 10 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆14Sep 28, 2023Updated 2 years ago
- This is the repository for the paper "Cross Miniapp Request Forgery"☆20Aug 30, 2023Updated 2 years ago
- ClientInspectorV2 - Unleashing the power of Azure LogAnalytics, Azure Data Collection Rules, Log Ingestion API by doing client inventory …☆25Apr 28, 2023Updated 2 years ago
- 🚀 Lightweight Python library for building production LLM applications with smart context management and automatic token optimization. Sa…☆37Dec 23, 2025Updated 3 months ago
- notepad++堆缓冲区溢出漏洞CVE-2023-40031 分析与复现☆15Sep 8, 2023Updated 2 years ago
- A command based oscilloscope software.☆17Feb 22, 2026Updated last month
- Investigating attacks using Splunk Enterprise logs and creating SPL intrusion detection searches based on known attacker TTPs and anomaly…☆29Nov 19, 2023Updated 2 years ago
- Fetching data from system☆11Jun 18, 2017Updated 8 years ago
- Performs review of Entra ID users and their assigned roles based on least privilege principle and actual Entra ID operations performed wi…☆32Feb 23, 2026Updated last month
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Python code translations for the book Collins, Travis F., Robin Getz, Di Pu, Alexander M. Wyglinski: Software-Defined Radio for Engineers☆16Mar 29, 2020Updated 6 years ago
- AI Security Newsletter - A monthly digest of AI security research, insights, reports, upcoming events, and tools & resources☆33Feb 5, 2026Updated 2 months ago
- an Evil Java RMI Registry.☆50Feb 8, 2023Updated 3 years ago
- Offensive Security Vault structure for Obsidian☆24Jan 9, 2023Updated 3 years ago
- Kafka library with a schema registry integration☆10Dec 16, 2025Updated 4 months ago
- AI Dataset Generator – Create realistic datasets for demos, learning, and dashboards☆759Oct 3, 2025Updated 6 months ago
- AI agent for autonomous cyber operations☆514Nov 29, 2025Updated 4 months ago