NVISOsecurity / cyber-security-llm-agents
A collection of agents that use Large Language Models (LLMs) to perform tasks common on our day to day jobs in cyber security.
☆103Updated 11 months ago
Alternatives and similar repositories for cyber-security-llm-agents:
Users that are interested in cyber-security-llm-agents are comparing it to the libraries listed below
- The project serves as a strategic advisory tool, capitalizing on the ZySec series of AI models to amplify the capabilities of security pr…☆45Updated 11 months ago
- ☆104Updated 10 months ago
- Code for shelLM tool☆51Updated 2 months ago
- Intel Retrieval Augmented Generation (RAG) Utilities☆91Updated last year
- ☆242Updated 3 months ago
- some prompt about cyber security☆198Updated last year
- Sensor Mappings to ATT&CK is a collection of resources to assist cyber defenders with understanding which sensors and events can help det…☆49Updated last month
- ATLAS tactics, techniques, and case studies data☆63Updated last month
- This is a dataset intended to train a LLM model for a completely CVE focused input and output.☆59Updated 5 months ago
- The objective of this program is to leverage AI-LLM technology to process of human language-based CTI documents to succinctly summarize t…☆50Updated last year
- AI-powered tool designed to help producing Threat Intelligence Mindmap.☆93Updated 3 months ago
- Delving into the Realm of LLM Security: An Exploration of Offensive and Defensive Tools, Unveiling Their Present Capabilities.☆162Updated last year
- CALDERA plugin for adversary emulation of AI-enabled systems☆95Updated last year
- Generate a MITRE ATT&CK Navigator based on a list of CVEs. Database with CVE, CWE, CAPEC, and MITRE ATT&CK Techniques data is updated dai…☆86Updated this week
- Extracts IoCs, TTPs and the relationships between them. Outputs a STIX 2.1 bundle.☆53Updated this week
- yara detection rules for hunting with the threathunting-keywords project☆116Updated last month
- TIE is a machine learning model for inferring associated MITRE ATT&CK techniques from previously observed techniques.☆49Updated this week
- Small web frontend for using openAI's GPT-3.5 and GPT-4's API☆53Updated 2 weeks ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆122Updated last year
- A Model Context Protocol (MCP) server for querying the VirusTotal API.☆42Updated last month
- SecureBERT is a domain-specific language model to represent cybersecurity textual data.☆88Updated 9 months ago
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆52Updated last month
- All things specific to LLM Red Teaming Generative AI☆24Updated 6 months ago
- HoneyAgents is a PoC demo of an AI-driven system that combines honeypots with autonomous AI agents to detect and mitigate cyber threats. …☆46Updated last year
- SMET : Semantic Mapping of CVE to ATT&CK and its Application to Cybersecurity☆46Updated 7 months ago
- Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogue…☆58Updated last week
- Intelligence around common attacker behaviors (MITRE ATT&CK TTPs), in the form of ATT&CK Navigator "layer" json files.☆35Updated 2 years ago
- ☆102Updated 2 weeks ago
- MEGR-APT: A Memory-Efficient APT Hunting System Based on Attack Representation Learning☆41Updated 2 months ago
- ☆43Updated 2 years ago