Argandov / termbot
CLI tool for interacting with GPT, analyze local files, etc.
☆16Updated last month
Alternatives and similar repositories for termbot:
Users that are interested in termbot are comparing it to the libraries listed below
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆40Updated 7 months ago
- Framework for Monitoring File Ingestion Source for Yara Matches☆46Updated last month
- An LLM and OCR based Indicator of Compromise Extraction Tool☆33Updated 4 months ago
- NOVA: The Prompt Pattern Matching☆55Updated this week
- All the principles of the AI modular structure that generates malicious code fragments sold on the dark web☆68Updated 11 months ago
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆29Updated 11 months ago
- Build a CVE library with aggregated CISA, EPSS and CVSS data☆27Updated last year
- 🤖 A GitHub action that leverages fabric patterns through an agent-based approach☆22Updated 3 months ago
- A tool to curate compelling news on cloud technologies and cybersecurity. By aggregating information from RSS feeds and Reddit, it identi…☆33Updated 8 months ago
- A Golang library for interacting with the EPSS (Exploit Prediction Scoring System).☆27Updated last month
- Automation tool for Windows Deception Host Burn-In☆85Updated 4 months ago
- Data from Dark Web Marketplace scraping - Be careful☆39Updated 5 months ago
- A knowledge source about TTPs used to target GenAI-based systems, copilots and agents☆32Updated last month
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆19Updated last year
- CSIRT Tooling: Best Practices in Developing, Maintaining and Distributing Open Source Tools☆16Updated 2 years ago
- Collection of videos of Raids on Cybercriminals☆19Updated 3 weeks ago
- Repository that contains a set of purposefully erroneous Yara rules.☆51Updated last year
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆70Updated last month
- A repository of curated lists with elements such as IoCs to use for threat hunting & detection queries.☆34Updated 8 months ago
- ☆73Updated 3 weeks ago
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆68Updated 9 months ago
- ReconPal: Leveraging NLP for Infosec☆56Updated 2 years ago
- Mitre ATT&CK framework tactics and techniques in markdown format for best use in Obsidian☆17Updated 8 months ago
- ☆24Updated 3 months ago
- ☆80Updated last year
- Comprehensive adversary emulation tool for security testing on Google Cloud Platform (GCP) environments.☆14Updated 10 months ago
- Contextal Platform, a powerful, open-source cybersecurity solution designed for contextual threat detection and intelligence.☆27Updated 3 weeks ago
- Jupyter Univere is a search engine for all infosec jupyter notebooks☆26Updated 3 weeks ago
- Maturity Model Collaborative project☆15Updated 2 years ago
- The EPSS Calculator is a user-friendly web application that calculates the EPSS (Exploit Prediction Scoring System) score based on a prov…☆13Updated 5 months ago