ElNiak / awesome-ai-cybersecurity
Welcome to the ultimate list of resources for AI in cybersecurity. This repository aims to provide an organized collection of high-quality resources to help professionals, researchers, and enthusiasts stay updated and advance their knowledge in the field.
☆14Updated 3 months ago
Related projects ⓘ
Alternatives and complementary repositories for awesome-ai-cybersecurity
- Basic protection against HTML smuggling attempts.☆30Updated this week
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆29Updated 6 months ago
- Simplify the link between social and real identities☆10Updated 2 months ago
- Legba recipes.☆41Updated 2 months ago
- This project provides a set of Google Apps Scripts designed to help you identify and analyze potentially malicious domains directly from …☆11Updated 2 months ago
- Visualize BBOT scans in realtime with VivaGraphJS☆22Updated this week
- A collection of tools that I use in CTF's or for assessments☆55Updated last month
- If you are interested in a live feed API, please contact us☆14Updated last week
- Slides and videos from talks given at cons☆11Updated 4 months ago
- Pyfuscator is a Python tool designed to obfuscate Python scripts by encoding and encrypting them. It allows you to transform your Python …☆16Updated 3 months ago
- Check for the existence of an email on Google platforms☆12Updated 7 months ago
- The Network Execution Tool☆13Updated 7 months ago
- ECC Public Key Cryptography☆36Updated last year
- Powershell implementation of a novel technique. Invoke-GPTObfuscation is a PowerShell Obfuscator that utilizes OpenAI (and other APIs) to…☆49Updated 11 months ago
- Multi-services Asynchronous Honeypot Solution with real-time threat detection☆25Updated last month
- MalDev & AV-EDR Evasion for Pentesters☆12Updated last year
- APT hub, It help's research to collect information and data on the latest APT activities. It collects data on APT profiles, IOCs(1 yr), a…☆47Updated 2 weeks ago
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆23Updated 2 months ago
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆30Updated this week
- The Kill-The-Code Python Program provides a robust mechanism for remotely controlling code execution by monitoring a specified URL for a …☆13Updated 3 months ago
- Service that scans your Infrastructure as Code for common vulnerabilities☆46Updated 10 months ago
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆37Updated last year
- HARpwn - HARToken Extraction and Sanitization Module; HARpwn is a PowerShell module designed to streamline the extraction and sanitizati…☆19Updated last year
- Top 400 passwords as per HaveIBeenPwned☆20Updated 3 weeks ago
- GrizzlyTunnel is a automation script designed to create seamless Layer 3 VPN like tunnels over SSH.☆23Updated 7 months ago
- Collection of videos of Raids on Cybercriminals☆17Updated last month
- Repository for write-ups of Sofia Santos' OSINT exercises☆12Updated last week
- Web application designed to raise user awareness and fortify online identities against tracking techniques.☆26Updated 9 months ago
- Crack passwords with Hashcat using a Discord Bot.☆22Updated last year