A collection of agents that use Large Language Models (LLMs) to perform tasks common on our day to day jobs in cyber security.
☆255May 7, 2024Updated last year
Alternatives and similar repositories for cyber-security-llm-agents
Users that are interested in cyber-security-llm-agents are comparing it to the libraries listed below
Sorting:
- CocktailParty is a data broker system based on phoenix framework☆23Apr 23, 2025Updated 10 months ago
- PenGym: Pentesting Training Framework for Reinforcement Learning Agents☆55Dec 19, 2024Updated last year
- A package to create HTML MISP reports, including volume of trending events and attributes, evens received from key organisations and targ…☆11Aug 14, 2025Updated 6 months ago
- Napkin is a simple tool to produce statistical analysis of a text☆12Feb 25, 2024Updated 2 years ago
- USB Scanning device☆32Sep 16, 2025Updated 5 months ago
- An overview of LLMs for cybersecurity.☆1,239Feb 9, 2026Updated 3 weeks ago
- Interface LLMs from within MISP to extract TTPs and threat intel from CTI reports☆18Nov 13, 2023Updated 2 years ago
- Private Search Set (PSS) is an extension to standard Bloom filter or a standalone hash file to describe and share private set.☆16Jan 10, 2025Updated last year
- Private AI and Open source driven projects that can be used to help solve a plethora of security problems☆19Sep 7, 2024Updated last year
- Multi-Agent Reinforcement Learning on network-security☆20Apr 12, 2022Updated 3 years ago
- Inspector-gadget (a.k.a. PSHAPE - Practical Support for Half-Automated Program Exploitation) is an open source tool which assists analyst…☆27Dec 17, 2019Updated 6 years ago
- External twitter feeder for AIL framework☆16Apr 16, 2023Updated 2 years ago
- Incident Notification Platform by @NC3-LU☆11Updated this week
- Implementation and datasets for "Training Language Models to Generate Quality Code with Program Analysis Feedback"☆42Jul 21, 2025Updated 7 months ago
- Fast lookup server for NSRL and other hash database used in digital forensic☆48Jan 26, 2026Updated last month
- Machine Learning-based tool for Cybersecurity Risk Assessment☆11Jul 18, 2021Updated 4 years ago
- A database for storing, querying and doing stats on credential leaks☆39May 23, 2023Updated 2 years ago
- The Advanced Vulnerability Information Sharing Environment -- A Platform for CVD and PSIRT Management☆10Jan 30, 2024Updated 2 years ago
- Taranis NG is an OSINT gathering and analysis tool for CSIRT teams and organisations. It allows team-to-team collaboration, and contains …☆10Oct 17, 2023Updated 2 years ago
- The repository of paper "HackMentor: Fine-Tuning Large Language Models for Cybersecurity".☆137May 30, 2024Updated last year
- Ivanti Pulse Secure CVE-2023-46805 Scanner - Based on Assetnote's Research☆12Jan 19, 2024Updated 2 years ago
- Terraform playbook of a vulnerable Azure deployment☆10Apr 28, 2022Updated 3 years ago
- 🤖🛡️🔍🔒🔑 Tiny package designed to support red teams and penetration testers in exploiting large language model AI solutions.☆26May 16, 2024Updated last year
- acquire is a tool to quickly gather forensic artifacts from disk images or a live system into a lightweight container.☆117Feb 25, 2026Updated last week
- Data orchestration and management.☆10Aug 4, 2025Updated 7 months ago
- Cyberex Secure is planned to be a security solution with a wide range of features such as phishing detection, advanced AI- face recognit…☆12Apr 5, 2023Updated 2 years ago
- An ongoing & curated collection of awesome vulnerability scanning software, libraries and frameworks, best guidelines, technical resource…☆14Feb 7, 2022Updated 4 years ago
- 清羽(ClearFeather)是一款专为网络安全攻防演练设计的资产智能清洗与分类工具。它能够自动化处理攻防演练中的各类资产数据,包括IP、域名、URL等,通过结合DeepSeek API的大语言模型能力和精准的正则表达式处理,实现资产的高效识别、分类与整理。☆23May 29, 2025Updated 9 months ago
- A privacy-aware exchange module to securely and privately share your indicators☆14Aug 23, 2017Updated 8 years ago
- CyCAT.org API back-end server including crawlers☆29Feb 4, 2023Updated 3 years ago
- Automation script to download JSON MISP files from a SFTP server and import them via API to a MISP instance.☆15May 12, 2023Updated 2 years ago
- Lists of not-suitable-for-work words as YARA rules☆29Feb 2, 2026Updated last month
- Chat4GPT Experiments for Security☆11Mar 27, 2023Updated 2 years ago
- The CRATOS proxy API integrates with your MISP instance and allows to extract indicators that can be consumed by security components such…☆13Sep 21, 2025Updated 5 months ago
- a scaling framework for tor traffic balancing 🧦 🧅 ⚖️☆14Nov 10, 2025Updated 3 months ago
- This repository contains attack chains generated by Aurora that can be reproduced in virtual environments.☆43Jan 25, 2026Updated last month
- This project aims to fine-tune a pre-trained LLM using CTI-specific data and evaluate its performance with CTIBench, a benchmark designed…☆17Sep 5, 2024Updated last year
- NTFS file system specimens☆13Jul 3, 2023Updated 2 years ago
- Command line interface (CLI) to install Kali Linux Tools in your desired distribution.☆11May 27, 2022Updated 3 years ago