Awesome list of AI for cybersecurity including network (network traffic analysis and intrusion detection), endpoint (anti-malware), application (WAF or database firewalls), user (UBA), process behavior (anti-fraud).
☆248Oct 3, 2023Updated 2 years ago
Alternatives and similar repositories for Awesome-AI-for-cybersecurity
Users that are interested in Awesome-AI-for-cybersecurity are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Learning tutorial for machine learning beginners☆17May 14, 2022Updated 3 years ago
- Book Introduction Page☆19Aug 10, 2023Updated 2 years ago
- ☆56Nov 23, 2024Updated last year
- AI-enabled Cybersecurity for Future Smart Environments☆25Aug 7, 2024Updated last year
- Hands-On Artificial Intelligence for Cybersecurity, publised by Packt☆184Jan 30, 2023Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A collection of awesome resources related AI security☆915Apr 5, 2026Updated last week
- Cybersecurity of Machine Learning and Artificial Intelligence☆69Mar 4, 2022Updated 4 years ago
- ☆163Feb 6, 2026Updated 2 months ago
- HomeLab Setup with a Firewall, SIEM Solution, Exploitable machines and Attacker.☆32Jul 20, 2022Updated 3 years ago
- Machine Learning For Cybersecurity.☆71Nov 9, 2019Updated 6 years ago
- AI-powered cybersecurity chatbot designed to provide helpful and accurate answers to your cybersecurity-related queries and also do code …☆347Feb 21, 2026Updated last month
- Host ChatGPT locally☆11Jan 15, 2024Updated 2 years ago
- An AI-backed threat hunting assistant that aligns to the PEAK framework.☆39Updated this week
- Archive of publicly available threat INTel reports (mostly APT Reports but not limited to).☆11Sep 30, 2018Updated 7 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Code for Book "AI for Cybersecurity: A Handbook of Use Case"☆22Aug 10, 2023Updated 2 years ago
- ☆39Apr 16, 2018Updated 8 years ago
- ☆15Nov 15, 2023Updated 2 years ago
- Assess Windows OS for security misconfigurations and hardening opportunities.☆36Jul 20, 2024Updated last year
- ☆43Dec 12, 2024Updated last year
- All Exploit List Made By Me☆17Apr 7, 2025Updated last year
- POC for netdata ndsudo vulnerability - CVE-2024-32019☆21Aug 3, 2025Updated 8 months ago
- Demo repository for running eBPF in GitHub Actions☆23Mar 27, 2025Updated last year
- This is the Network Flow Generator for ICSSIM☆17Aug 28, 2025Updated 7 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Penetration Testing AI Assistant based on open source LLMs.☆132Apr 4, 2026Updated 2 weeks ago
- Differential Privacy Guide☆20Jan 9, 2022Updated 4 years ago
- A curated list of cybersecurity tools and resources.☆2,114Apr 7, 2026Updated last week
- Comprehensive Cheat Sheet for Rapid7's Insight-IDR LEQL Search Language.☆11Mar 18, 2024Updated 2 years ago
- This repository offers a detailed taxonomy of existing AI-driven security solutions tailored for DevSecOps, highlighting the current rese…☆20Jul 2, 2025Updated 9 months ago
- A curated list of AI driven Cyber security Resources☆48Mar 28, 2026Updated 3 weeks ago
- Machine Learning for Cyber Security☆30Dec 14, 2021Updated 4 years ago
- Analysis of the major exploits that took place on the Ethereum blockchain☆17Oct 31, 2022Updated 3 years ago
- NEGSC☆47May 30, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A keylogger, sometimes called a keystroke logger or keyboard capture, is a type of surveillance technology used to monitor and record eac…☆18Jul 29, 2024Updated last year
- #AISecurity☆1,605Mar 8, 2026Updated last month
- Application Security Mind Maps☆11Apr 10, 2021Updated 5 years ago
- Machine Learning in Cybersecurity☆92May 23, 2025Updated 10 months ago
- Collection of tool you need to have in your Endpoint Detection and Response arsenal☆116Mar 22, 2024Updated 2 years ago
- Collection of cyber security and "AI" relevant topics☆73Jan 1, 2018Updated 8 years ago
- Machine Learning for Network Intrusion Detection & Misc Cyber Security Utilities☆225Apr 25, 2024Updated last year