A curated list of AI driven Cyber security Resources
☆48Mar 28, 2026Updated last month
Alternatives and similar repositories for awesome-genai-cyberhub
Users that are interested in awesome-genai-cyberhub are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- AI-based implant feature☆25Apr 28, 2025Updated last year
- An Inspect extension for agentic cyber evaluations☆25Updated this week
- Advancing TTP Analysis: Harnessing the Power of Large Language Models with Retrieval Augmented Generation☆11May 14, 2024Updated last year
- 🛡️ SIGMA Detection Engineering Platform A comprehensive AI-powered detection engineering platform for security teams to explore MITRE AT…☆45Jun 28, 2025Updated 10 months ago
- ☆56Nov 23, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- RedSage: A Cybersecurity Generalist LLM (ICLR'26)☆42Apr 7, 2026Updated 3 weeks ago
- AnnoCTR corpus for detection and linking of entities in cyber threat reports☆29Apr 12, 2024Updated 2 years ago
- Jupyter Univere is a search engine for all infosec jupyter notebooks☆36Mar 24, 2025Updated last year
- ☆121May 26, 2025Updated 11 months ago
- An AI-backed threat hunting assistant that aligns to the PEAK framework.☆41Updated this week
- Code that implements Factor Analysis of Information Risk (FAIR) in combination with MITRE ATT&CK using Markov Chain Monte Carlo (via PyMC…☆44Dec 10, 2025Updated 4 months ago
- ☆56May 5, 2025Updated 11 months ago
- SecTor - Not-So-Secret Agents: Deploying AI to Optimize Security Operations☆35Oct 15, 2025Updated 6 months ago
- A pySigma wrapper and langchain toolkit for automatic rule creation/translation☆93Nov 3, 2025Updated 5 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Testing LLMs reflection and planning capabilities with gym environments☆14Aug 30, 2024Updated last year
- autoreport generates bug report templates for security researchers☆20Aug 4, 2023Updated 2 years ago
- This project aims to fine-tune a pre-trained LLM using CTI-specific data and evaluate its performance with CTIBench, a benchmark designed…☆19Sep 5, 2024Updated last year
- A Vue App for quickly generating KML Search Grids☆13Nov 12, 2024Updated last year
- A curated collection of security tools, frameworks, and resources for Enumeration, Cloud Security, Static Analysis, Threat Intelligence, …☆22Dec 2, 2025Updated 4 months ago
- Node.js implementation of the PirateBox Server inspired by David Darts☆15Dec 8, 2015Updated 10 years ago
- genAI agent providing security context, tooling for performing security analysis on CVE, components and more☆23Updated this week
- A simple server to act as a Veeam "honeypot" providing alerting for network scans for Veeam services☆16Aug 31, 2025Updated 7 months ago
- A Windows Event Log MCP☆44Aug 25, 2025Updated 8 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Finding Missing People, extract information in Dark Web and Surfaceweb Investigation and Human Trafficking Support☆36May 29, 2024Updated last year
- A Shodan-based tool to discover publicly exposed Ollama instances and list available LLM models.☆21May 27, 2025Updated 11 months ago
- [ICLR 2025 SCI-FM Workshop] Lemur: Log Parsing with Entropy Sampling and Chain-of-Thought Merging☆14Mar 27, 2025Updated last year
- This repository is the tutorial for the IsitObservable Episode on Fluentd☆11May 7, 2025Updated 11 months ago
- Rudimentary IP and URL threat feeds sourced from The Fakelabs Project.☆10Dec 13, 2025Updated 4 months ago
- ☆19Jan 14, 2026Updated 3 months ago
- Threat feeds designed to extract adversarial TTPs and IOCs, using: ✨AI✨☆69Apr 5, 2026Updated 3 weeks ago
- External C2 is a specification to allow third-party programs to act as a communication layer for Cobalt Strike’s Beacon payload.☆18Jul 17, 2025Updated 9 months ago
- Files to automatically deploy red team Active Directory test lab☆49May 6, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆68Apr 16, 2026Updated last week
- ☆22Feb 5, 2025Updated last year
- ☆17Dec 18, 2025Updated 4 months ago
- A GitHub workflow to identify employees that have leaked your organization's code☆13May 23, 2023Updated 2 years ago
- ☆14Feb 25, 2025Updated last year
- A simple trap for web crawlers☆13Aug 2, 2023Updated 2 years ago
- A series of cloud focused KQL queries for threat hunting and DFIR☆12Oct 21, 2025Updated 6 months ago