Argandov / termbot
CLI tool for interacting with GPT, analyze local files, etc.
☆15Updated 5 months ago
Related projects ⓘ
Alternatives and complementary repositories for termbot
- A collection of dashboards, templates, API's and Power BI code for vulnerability management and analysis☆13Updated last week
- Dragon-GPT uses Chat-GPT, or local LLM, to execute automatic and AI-powered threat modeling analysis on a given OWASP Threat Dragon diagr…☆31Updated last year
- Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogue…☆43Updated last month
- An LLM and OCR based Indicator of Compromise Extraction Tool☆31Updated 7 months ago
- ETM enables the creation of detailed attack graphs and figures while calculating the risk associated with your attack narratives. ETM was…☆25Updated last year
- DefectDojo Community Content☆17Updated last month
- Run Capture the Flags and Security Trainings with OWASP WrongSecrets☆43Updated this week
- Code and Website For PatchThis.app☆28Updated this week
- Advisories, guidance, best practice documents and more issued by members of the EU CSIRTs network, a network composed of EU Member States…☆51Updated 2 weeks ago
- On demand query API for https://github.com/davidonzo/Threat-Intel project.☆54Updated 5 months ago
- Mitre ATT&CK framework tactics and techniques in markdown format for best use in Obsidian☆16Updated 3 months ago
- MITRE ATT&CK Based App in Power BI☆12Updated 8 months ago
- CSIRT Tooling: Best Practices in Developing, Maintaining and Distributing Open Source Tools☆16Updated 2 years ago
- Lua plugin to extract data from Wireshark and convert it into MISP format☆47Updated last year
- An open source platform to support analysts to organise their case and tasks☆55Updated this week
- ☆26Updated 2 weeks ago
- Analyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public service - https…☆125Updated last year
- TakedownGPT combines a LangChain Agent with OpenAI function calling to automate the discovery of domain registrars and drafting of takedo…☆36Updated last month
- A CLI wrapper for libmodsecurity (v3.0.10)☆11Updated last year
- Automation tool for Windows Deception Host Burn-In☆76Updated 4 months ago
- InfoSec OpenAI Examples☆19Updated 11 months ago
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆64Updated 5 months ago
- Open-source powered SIEM, Vulnerability Scanning, Host- & Network-IDS. Built upon Elastic Stack, OpenVAS, Suricata. Wrapped in a Python F…☆14Updated 2 years ago
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆37Updated last year
- Webhood is a privately hosted URL scanner used by threat hunters and security analysts for analyzing phishing and malicious sites.☆26Updated last month
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆38Updated 6 months ago
- Converting data from services like Censys and Shodan to a common data model☆48Updated 2 months ago
- Threat Simulator for Enterprise Networks☆14Updated 2 years ago
- LOKI2 - Simple IOC and YARA Scanner☆80Updated 3 months ago
- GenAIPot is the first A.I honeypot that emulates services and using Generative AI to do that in order to be more stealth.☆15Updated this week