NVISOsecurity / cyber-security-llm-agents
A collection of agents that use Large Language Models (LLMs) to perform tasks common on our day to day jobs in cyber security.
☆93Updated 10 months ago
Alternatives and similar repositories for cyber-security-llm-agents:
Users that are interested in cyber-security-llm-agents are comparing it to the libraries listed below
- The project serves as a strategic advisory tool, capitalizing on the ZySec series of AI models to amplify the capabilities of security pr…☆46Updated 10 months ago
- Code for shelLM tool☆51Updated last month
- ☆104Updated 9 months ago
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆51Updated last week
- ☆229Updated 2 months ago
- Small web frontend for using openAI's GPT-3.5 and GPT-4's API☆52Updated 7 months ago
- ATLAS tactics, techniques, and case studies data☆57Updated last week
- some prompt about cyber security☆190Updated last year
- Intel Retrieval Augmented Generation (RAG) Utilities☆90Updated last year
- The objective of this program is to leverage AI-LLM technology to process of human language-based CTI documents to succinctly summarize t…☆48Updated 11 months ago
- A library and command line tool for extracting indicators of compromise (IOCs) from security reports in PDF, HTML, Word, or text format☆31Updated this week
- Sensor Mappings to ATT&CK is a collection of resources to assist cyber defenders with understanding which sensors and events can help det…☆49Updated this week
- TIE is a machine learning model for inferring associated MITRE ATT&CK techniques from previously observed techniques.☆48Updated this week
- CALDERA plugin for adversary emulation of AI-enabled systems☆93Updated last year
- Merge of two major cyber adversary datasets, MITRE ATT&CK and ETDA/ThaiCERT Threat Actor Cards, enabling victim/motivation-adversary-tech…☆53Updated 2 years ago
- pretrained BERT model for cyber security text, learned CyberSecurity Knowledge☆175Updated last year
- MEGR-APT: A Memory-Efficient APT Hunting System Based on Attack Representation Learning☆39Updated last month
- Delving into the Realm of LLM Security: An Exploration of Offensive and Defensive Tools, Unveiling Their Present Capabilities.☆160Updated last year
- yara detection rules for hunting with the threathunting-keywords project☆110Updated 3 weeks ago
- A comprehensive knowledge base for security professionals to keep track of and build defenses against API attack techniques.☆42Updated 6 months ago
- SMET : Semantic Mapping of CVE to ATT&CK and its Application to Cybersecurity☆45Updated 6 months ago
- A MITRE Caldera plugin☆42Updated 4 months ago
- This is a dataset intended to train a LLM model for a completely CVE focused input and output.☆55Updated 3 months ago
- ☆87Updated last month
- AI-powered tool designed to help producing Threat Intelligence Mindmap.☆87Updated 2 months ago
- "Linking Threat Tactics, Techniques, and Patterns with Defensive Weaknesses, Vulnerabilities and Affected Platform Configurations for Cyb…☆93Updated 8 months ago
- Cybersecurity Intelligent Pentesting Helper for Ethical Researcher (CIPHER). Fine tuned LLM for penetration testing guidance based on wri…☆19Updated 3 months ago
- ☆37Updated 3 months ago
- AttackMate is an attack orchestration tool that executes full attack-chains based on playbooks.☆32Updated 3 weeks ago