NOVA: The Prompt Pattern Matching
☆97Jan 27, 2026Updated last month
Alternatives and similar repositories for nova-framework
Users that are interested in nova-framework are comparing it to the libraries listed below
Sorting:
- Jupyter Univere is a search engine for all infosec jupyter notebooks☆35Mar 24, 2025Updated 11 months ago
- Repo for experimenting and testing MCP server builds for CTI-related research.☆27May 13, 2025Updated 9 months ago
- Sandbox samples and monitor them with kunai☆29Jun 24, 2025Updated 8 months ago
- This is a repository to experiment with MCP for security☆47Jan 22, 2025Updated last year
- An index of publicly available and open-source threat detection rulesets.☆130Apr 17, 2025Updated 10 months ago
- AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE…☆1,205Dec 29, 2025Updated 2 months ago
- Eve is a JAMF exploitation toolkit used to interact with locally hosted JAMF servers and those hosted on jamfcloud.com.☆42Sep 16, 2025Updated 5 months ago
- An experimental project using LLM technology to generate security documentation for Open Source Software (OSS) projects☆34Feb 28, 2025Updated last year
- Collection of Jupyter Notebooks by @fr0gger_☆191Dec 16, 2025Updated 2 months ago
- Swift code to parse the quarantine history database, Chrome history database, Safari history database, and Firefox history database on ma…☆15Dec 3, 2020Updated 5 years ago
- Code Repository for: AIRTBench: Measuring Autonomous AI Red Teaming Capabilities in Language Models☆93Updated this week
- Virustotal Data to Timesketch☆16Feb 28, 2019Updated 7 years ago
- ☆20Apr 10, 2025Updated 10 months ago
- A security analysis tool that identifies DNS queries made by browser extensions, empowering security teams to detect and investigate susp…☆186Feb 9, 2025Updated last year
- Tool to guess CPE name based on common software name☆117Feb 11, 2026Updated 2 weeks ago
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆154Apr 25, 2022Updated 3 years ago
- An evolving repository of CloudTrail events with detailed descriptions, MITRE ATT&CK insights, real-world incidents, references and secur…☆174Updated this week
- LOLAPPS is a compendium of applications that can be used to carry out day-to-day exploitation.☆195Feb 19, 2025Updated last year
- Examine Chrome extensions for security issues☆95Nov 16, 2025Updated 3 months ago
- A comprehensive ETW (Event Tracing for Windows) event generation tool designed for testing and research purposes.☆260Sep 23, 2025Updated 5 months ago
- This repository contains the research and components of our research into using Sigma for AWS Incident Response.☆31Jul 12, 2023Updated 2 years ago
- ☆78Sep 29, 2025Updated 5 months ago
- An advanced Twitter scraping & OSINT tool written in Python that doesn't use Twitter's API, allowing you to scrape a user's followers, fo…☆13Aug 19, 2022Updated 3 years ago
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆42Oct 29, 2024Updated last year
- AIL framework - Analysis Information Leak framework☆884Updated this week
- Galah: An LLM-powered web honeypot.☆634Jul 24, 2025Updated 7 months ago
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆150Sep 21, 2024Updated last year
- IATelligence is a Python script that will extract the IAT of a PE file and request GPT to get more information about the API and the ATT&…☆374Dec 9, 2022Updated 3 years ago
- A simple application that extracts your IoCs from garbage input and checks their reputation using multiple CTI services.☆605Feb 7, 2026Updated 3 weeks ago
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆127Dec 5, 2023Updated 2 years ago
- Red Teaming for AI and Cloud☆208Dec 5, 2025Updated 2 months ago
- Verizon Burp Extensions: AI Suite☆142Apr 22, 2025Updated 10 months ago
- PII detection platform, leveraging human-in-the-loop AI☆54Nov 29, 2024Updated last year
- A collection of CVEs weaponized by ransomware operators☆129Oct 13, 2025Updated 4 months ago
- firedrill is a malware simulation harness for evaluating your security controls☆197Jan 26, 2024Updated 2 years ago
- LotL RMM☆305Feb 13, 2026Updated 2 weeks ago
- BlackBerry Threat Research & Intelligence☆100Oct 20, 2023Updated 2 years ago
- machofile is a module to parse Mach-O binary files☆94Feb 10, 2026Updated 2 weeks ago
- Performing secure code review with LLMs (and vibe coding IDEs)☆36Aug 5, 2025Updated 6 months ago