Awesome list of AI for cybersecurity including network (network traffic analysis and intrusion detection), endpoint (anti-malware), application (WAF or database firewalls), user (UBA), process behavior (anti-fraud).
☆239Oct 3, 2023Updated 2 years ago
Alternatives and similar repositories for Awesome-AI-for-cybersecurity
Users that are interested in Awesome-AI-for-cybersecurity are comparing it to the libraries listed below
Sorting:
- Book Introduction Page☆19Aug 10, 2023Updated 2 years ago
- ☆54Nov 23, 2024Updated last year
- AI-Powered CyberSecurity Compliance: Boost Network Security with OpenAI GPT-3.5-turbo☆10May 18, 2023Updated 2 years ago
- Machine Learning-based tool for Cybersecurity Risk Assessment☆11Jul 18, 2021Updated 4 years ago
- A collection of awesome resources related AI security☆797Feb 26, 2026Updated last week
- An Interface for AI built for cybersecurity professionals☆94Feb 19, 2025Updated last year
- A Machine Learning based tool for identifying P2P (Peer To Peer) Bot-Nets using network traffic analysis, as well as detect the hosts inv…☆12Jan 4, 2023Updated 3 years ago
- Analysis of the major exploits that took place on the Ethereum blockchain☆17Oct 31, 2022Updated 3 years ago
- A Collection of Awesome Personal Search Engines and Related Projects☆20Jan 10, 2023Updated 3 years ago
- ☆39Apr 16, 2018Updated 7 years ago
- Malicious URL Detection Model NN optimized by Genetic Algorithms 🧬☆36Aug 20, 2023Updated 2 years ago
- Assess Windows OS for security misconfigurations and hardening opportunities.☆36Jul 20, 2024Updated last year
- This repository offers a detailed taxonomy of existing AI-driven security solutions tailored for DevSecOps, highlighting the current rese…☆19Jul 2, 2025Updated 8 months ago
- Private AI and Open source driven projects that can be used to help solve a plethora of security problems☆19Sep 7, 2024Updated last year
- ☆43Dec 12, 2024Updated last year
- CybGPT is at the forefront of integrating OpenAI's advanced GPT technology with the complex landscape of cybersecurity.☆40Aug 6, 2025Updated 7 months ago
- ☆15May 11, 2025Updated 9 months ago
- The ACSC CyberTools Plugins are build upon the functionality of the Constellation data visualisation platform to deliver enrichments suit…☆26Jul 26, 2023Updated 2 years ago
- A Chrome extension that creates a personalized map of the web based on the user's browsing history.☆25Mar 10, 2013Updated 12 years ago
- GRC (Governance, Risk and Compliance) Software, to manage risks and controls. It is based in best practices and helps organizations to ma…☆27Mar 8, 2023Updated 3 years ago
- Collection of writeups on ICS/SCADA security.☆196Oct 19, 2025Updated 4 months ago
- Detect leaks in security event logs.☆20Apr 9, 2019Updated 6 years ago
- ☆10Jan 18, 2024Updated 2 years ago
- Machine Learning for Cyber Security☆8,177Aug 19, 2024Updated last year
- Heavyweight Python dynamic analysis framework☆17Apr 17, 2024Updated last year
- ☆25Feb 5, 2026Updated last month
- Azure AD Incident Response☆27Oct 8, 2021Updated 4 years ago
- Android Digital Bank Vulnerable Mobile App☆37Aug 15, 2015Updated 10 years ago
- Zeek-Formatted Threat Intelligence Feeds☆387Updated this week
- A Advanced Line Follower Robot with my 16 IR Sensor Array using ESP32 Microcontroller☆15Apr 10, 2024Updated last year
- Multi-step AI agents powered by Gemini 2.0 and the LangGraph framework. These agents orchestrate complex workflows and enhance their reas…☆10Dec 19, 2024Updated last year
- ☆15Jun 16, 2025Updated 8 months ago
- ☆10Feb 12, 2026Updated 3 weeks ago
- Cyber-Security Bible! Theory and Tools, Kali Linux, Penetration Testing, Bug Bounty, CTFs, Malware Analysis, Cryptography, Secure Program…☆167Oct 21, 2024Updated last year
- Documentation and guidance to practice secure coding for various PLC vendors☆42Oct 27, 2023Updated 2 years ago
- List of Github repositories and articles with list of dorks for different search engines☆32May 15, 2022Updated 3 years ago
- CROSS PLATFORM MULTI NETCAT SERVER☆12Sep 17, 2025Updated 5 months ago
- Fastest Tiktok Reporter☆13Nov 11, 2024Updated last year
- IT Risk Management tools☆14Apr 4, 2025Updated 11 months ago