Argandov / termbot
CLI tool for interacting with GPT, analyze local files, etc.
☆15Updated last month
Alternatives and similar repositories for termbot:
Users that are interested in termbot are comparing it to the libraries listed below
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆39Updated 7 months ago
- A collection of dashboards, templates, API's and Power BI code for vulnerability management and analysis☆15Updated last month
- The EPSS Calculator is a user-friendly web application that calculates the EPSS (Exploit Prediction Scoring System) score based on a prov…☆11Updated 4 months ago
- Automation tool for Windows Deception Host Burn-In☆83Updated 3 months ago
- ☆18Updated 4 months ago
- Collection of videos of Raids on Cybercriminals☆19Updated last week
- Small web frontend for using openAI's GPT-3.5 and GPT-4's API☆52Updated 7 months ago
- Jupyter Univere is a search engine for all infosec jupyter notebooks☆26Updated this week
- DefectDojo Community Content☆17Updated 5 months ago
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆66Updated 9 months ago
- Open YARA scan- and search engine☆22Updated last month
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆18Updated last year
- AIL project training materials☆28Updated last month
- A repository of curated lists with elements such as IoCs to use for threat hunting & detection queries.☆34Updated 8 months ago
- Maturity Model Collaborative project☆14Updated 2 years ago
- A knowledge source about TTPs used to target GenAI-based systems, copilots and agents☆30Updated 3 weeks ago
- Code and Website For PatchThis.app☆29Updated this week
- MITRE ATT&CK Based App in Power BI☆13Updated last year
- Daily updates from leaked data search engines, aggregators and similar services.☆94Updated this week
- Open-source Fabric templates for cybersecurity and compliance☆16Updated 2 months ago
- ☆80Updated last year
- IOCs from Google's Threat Analysis Group (TAG)☆29Updated 3 months ago
- Build a CVE library with aggregated CISA, EPSS and CVSS data☆27Updated last year
- An LLM and OCR based Indicator of Compromise Extraction Tool☆33Updated 3 months ago
- Strelka Web UI for File Submission and Analysis☆64Updated last week
- This is a repository to experiment with MCP for security☆15Updated 2 months ago
- Framework for Monitoring File Ingestion Source for Yara Matches☆45Updated 2 weeks ago
- ☆19Updated 4 months ago
- A collection of reports and case studies to understand the threat landscape for UK critical infrastructure☆38Updated last year
- Extract machine readable cyber threat intelligence from unstructured data (inc. PDFs, Word docs, and HTML pages)☆13Updated this week