Billy1900 / Awesome-AI-for-cybersecurityView external linksLinks
Awesome list of AI for cybersecurity including network (network traffic analysis and intrusion detection), endpoint (anti-malware), application (WAF or database firewalls), user (UBA), process behavior (anti-fraud).
☆236Oct 3, 2023Updated 2 years ago
Alternatives and similar repositories for Awesome-AI-for-cybersecurity
Users that are interested in Awesome-AI-for-cybersecurity are comparing it to the libraries listed below
Sorting:
- Book Introduction Page☆19Aug 10, 2023Updated 2 years ago
- ☆54Nov 23, 2024Updated last year
- A collection of awesome resources related AI security☆550Updated this week
- Machine Learning-based tool for Cybersecurity Risk Assessment☆11Jul 18, 2021Updated 4 years ago
- AI-Powered CyberSecurity Compliance: Boost Network Security with OpenAI GPT-3.5-turbo☆10May 18, 2023Updated 2 years ago
- This is the Network Flow Generator for ICSSIM☆16Aug 28, 2025Updated 5 months ago
- nmap nse script for scan a whole country☆13Jun 28, 2022Updated 3 years ago
- A Collection of Awesome Personal Search Engines and Related Projects☆20Jan 10, 2023Updated 3 years ago
- ☆58Jun 28, 2025Updated 7 months ago
- Assess Windows OS for security misconfigurations and hardening opportunities.☆36Jul 20, 2024Updated last year
- Malicious URL Detection Model NN optimized by Genetic Algorithms 🧬☆36Aug 20, 2023Updated 2 years ago
- This repository offers a detailed taxonomy of existing AI-driven security solutions tailored for DevSecOps, highlighting the current rese…☆19Jul 2, 2025Updated 7 months ago
- Private AI and Open source driven projects that can be used to help solve a plethora of security problems☆19Sep 7, 2024Updated last year
- ☆44Dec 12, 2024Updated last year
- CybGPT is at the forefront of integrating OpenAI's advanced GPT technology with the complex landscape of cybersecurity.☆40Aug 6, 2025Updated 6 months ago
- The ACSC CyberTools Plugins are build upon the functionality of the Constellation data visualisation platform to deliver enrichments suit…☆24Jul 26, 2023Updated 2 years ago
- Clustering aircraft trajectories with recursive DBSCAN☆25Oct 7, 2019Updated 6 years ago
- Awesome GPT-4 with Applications. This is a collection of resources related to GPT-4, including news, official documents, demo and applica…☆20Mar 15, 2023Updated 2 years ago
- Collection of writeups on ICS/SCADA security.☆194Oct 19, 2025Updated 3 months ago
- Awesome list for cloud security related projects☆150Oct 4, 2022Updated 3 years ago
- Code for Book "AI for Cybersecurity: A Handbook of Use Case"☆22Aug 10, 2023Updated 2 years ago
- Various pentest stuff☆24Mar 18, 2025Updated 10 months ago
- Machine Learning for Cyber Security☆8,104Aug 19, 2024Updated last year
- Azure AD Incident Response☆27Oct 8, 2021Updated 4 years ago
- M365 Defender SOC Playbooks☆24Feb 6, 2023Updated 3 years ago
- Aircraft detection in satellite images using computer vision and machine learning.☆13Jul 30, 2024Updated last year
- A collection of awesome framework, libraries, learning tutorials, videos, webcasts, technical resources and cool stuff about Security Orc…☆111Jan 6, 2023Updated 3 years ago
- Android Digital Bank Vulnerable Mobile App☆37Aug 15, 2015Updated 10 years ago
- Zeek-Formatted Threat Intelligence Feeds☆384Updated this week
- ☆14Jun 16, 2025Updated 8 months ago
- Cyber-Security Bible! Theory and Tools, Kali Linux, Penetration Testing, Bug Bounty, CTFs, Malware Analysis, Cryptography, Secure Program…☆159Oct 21, 2024Updated last year
- Documentation and guidance to practice secure coding for various PLC vendors☆41Oct 27, 2023Updated 2 years ago
- Indexing awesome Smart-contract projects implemented on top of Ethereum 🏗️☆31Jun 1, 2021Updated 4 years ago
- List of Github repositories and articles with list of dorks for different search engines☆32May 15, 2022Updated 3 years ago
- A curated collection of free or freemium web-based penetration testing and vulnerability analysis tools. These tools assist security prof…☆94Apr 17, 2025Updated 9 months ago
- SecureDoc leverages the power of AI and blockchain technology to create a robust system for certificate authentication. This project ensu…☆14Aug 6, 2025Updated 6 months ago
- Installation: Install the NetHunter-Store app from: https://store.nethunter.com/ From the Kali NetHunter Store, install Termux, NetHunt…☆15Dec 18, 2021Updated 4 years ago
- A curated list of LLM driven Cyber security Resources☆45Oct 20, 2025Updated 3 months ago
- Generative and Parametric design code: featuring Processing / Python / Javascript / HTML / CSS☆14Nov 4, 2020Updated 5 years ago