A curated list of tools, papers, and datasets for applying AI to cybersecurity tasks. This list primarily focuses on modern AI technologies like Large Language Models (LLMs), Agents, and Multi-Modal systems and their applications in security operations.
☆124Mar 24, 2026Updated last month
Alternatives and similar repositories for Awesome-AI-For-Security
Users that are interested in Awesome-AI-For-Security are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This repo contains the codes for the experiments of the paper "AutoPenBench: Benchmarking Generative Agents for Penetration Testing".☆16Oct 28, 2025Updated 6 months ago
- Code for the paper "AICrypto: A Comprehensive Benchmark for Evaluating Cryptography Capabilities of Large Language Models"☆30Sep 27, 2025Updated 7 months ago
- Security Blogs - A simple aggregator for security news/blog☆26Apr 29, 2026Updated last week
- An Agentic platform that allows you to define extensions☆26Jul 27, 2025Updated 9 months ago
- Repository for the work of the CoSAI Technical Steering Committee (TSC)☆21Updated this week
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Microsoft Defender for Cloud attack simulation toolkit☆27Dec 24, 2024Updated last year
- A small go harness that uses Ollama to orchestrate LLMs in a restricted process flow☆17Sep 10, 2024Updated last year
- Security Rules & Workflows for the new wave of AI Development.☆46Aug 7, 2025Updated 8 months ago
- Perform basic NLP of popular subreddits to understand trending topics☆11Mar 4, 2015Updated 11 years ago
- In-the-wild deepfake detection dataset☆14Mar 5, 2025Updated last year
- [NeurIPS'24] RedCode: Risky Code Execution and Generation Benchmark for Code Agents☆75Apr 24, 2026Updated last week
- androi demo for mvp☆11Sep 24, 2016Updated 9 years ago
- List of groups that are carrying out cyber actions in the conflict between Israel and Iran.☆34Feb 12, 2026Updated 2 months ago
- Data about all known supply-chain attacks through history☆66May 28, 2025Updated 11 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- MCP Snitch is a macOS application that intercepts and monitors MCP server communications, providing security analysis, access control, an…☆94Oct 14, 2025Updated 6 months ago
- Point of Concept: To help to automate the collection of evidence for SOC 2 Audits and etc.☆11May 13, 2024Updated last year
- The project serves as a strategic advisory tool, capitalizing on the ZySec series of AI models to amplify the capabilities of security pr…☆69May 19, 2024Updated last year
- Cloud-native, durable state for AI agents: WAL+snapshots, watch streams, idempotency, leases, TLS/mTLS, capability tokens, Python/TS SDKs…☆55Oct 27, 2025Updated 6 months ago
- ☆102Feb 5, 2026Updated 3 months ago
- A simple tool to interact with web shells and command injection vulnerabilities☆36Nov 26, 2024Updated last year
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆107Oct 13, 2025Updated 6 months ago
- [42-b3yond-6ug] This repository hosts BugBuster, our team’s submission to the AI Cyber Challenge Final Competition.☆30Aug 19, 2025Updated 8 months ago
- OWASP EKS Goat is a deliberately vulnerable EKS cluster environment to explore AWS cloud-native security through hands-on attack and defe…☆43Apr 5, 2026Updated last month
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆12Jun 7, 2025Updated 10 months ago
- A tutorial and resources for exploit development learners☆10Jan 25, 2021Updated 5 years ago
- ClientInspectorV2 - Unleashing the power of Azure LogAnalytics, Azure Data Collection Rules, Log Ingestion API by doing client inventory …☆25Apr 28, 2023Updated 3 years ago
- ☆62Sep 25, 2025Updated 7 months ago
- ☆406Apr 28, 2026Updated last week
- Kusto and Log Analytics MCP server help you execute a KQL (Kusto Query Language) query within an AI prompt, analyze, and visualize the da…☆23Updated this week
- A security-first MCP server empowering AI agents to orchestrate Ghidra, Radare2, and YARA for automated reverse engineering.☆58Apr 27, 2026Updated last week
- Miscellaneous stuff I create☆69Apr 21, 2026Updated 2 weeks ago
- Fetching data from system☆11Jun 18, 2017Updated 8 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Performs review of Entra ID users and their assigned roles based on least privilege principle and actual Entra ID operations performed wi…☆32Feb 23, 2026Updated 2 months ago
- Blackhat 2025 presentation and codebase: AI SOC agent & MCP server for automated security investigation, alert triage, and incident respo…☆28Dec 28, 2025Updated 4 months ago
- A set of core functionality and convenience structs for a Golang microservice☆10Dec 9, 2021Updated 4 years ago
- MLOps Attack Toolkit☆43Aug 25, 2025Updated 8 months ago
- Did you contain the compromised identity? notyet☆40Updated this week
- an Evil Java RMI Registry.☆50Feb 8, 2023Updated 3 years ago
- Kafka library with a schema registry integration☆10Dec 16, 2025Updated 4 months ago