☆108Jun 2, 2024Updated last year
Alternatives and similar repositories for GenAI-Security-Adventures
Users that are interested in GenAI-Security-Adventures are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Intel Retrieval Augmented Generation (RAG) Utilities☆90Jan 29, 2024Updated 2 years ago
- Summarize CTI reports with OpenAI☆18May 4, 2026Updated last week
- ☆44Jul 11, 2025Updated 10 months ago
- Powershell Functions to interact with TheHive-Project☆11Jun 27, 2019Updated 6 years ago
- Private Search Set (PSS) is an extension to standard Bloom filter or a standalone hash file to describe and share private set.☆16Jan 10, 2025Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Open-source Fabric templates for cybersecurity and compliance☆32Jan 13, 2025Updated last year
- Jupyter Univere is a search engine for all infosec jupyter notebooks☆37Mar 24, 2025Updated last year
- AI-powered tool designed to help producing Threat Intelligence Mindmap.☆108Feb 16, 2026Updated 2 months ago
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆154Apr 25, 2022Updated 4 years ago
- Attack Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by devel…☆742Updated this week
- ☆10May 25, 2023Updated 2 years ago
- Command-line tool for discovering SaaS platforms a company uses via DNS enumeration☆40Jul 23, 2025Updated 9 months ago
- Collection of Jupyter Notebooks by @fr0gger_☆195Updated this week
- ☆263May 9, 2024Updated 2 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE…☆1,219Dec 29, 2025Updated 4 months ago
- simple C# portscanner - written for playing around with Metasploit's Execute-Assembly☆10Jul 1, 2023Updated 2 years ago
- Active C&C Detector☆156Oct 5, 2023Updated 2 years ago
- Scripts to help and speed up reversing activities☆13Jan 12, 2026Updated 4 months ago
- Ludus range for the Constructing Defense Lab☆120Apr 21, 2026Updated 2 weeks ago
- ☆109Dec 9, 2025Updated 5 months ago
- This repository contains scrapers programs to scrape hacking forums from Dark web☆64Apr 1, 2020Updated 6 years ago
- Cobalt Strike log state tracking, parsing, and storage☆24Jul 18, 2019Updated 6 years ago
- A cyber threat intelligence chatbot that ingested 2200+ reports from vx-underground.☆33Apr 1, 2024Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Re-play Security Events☆1,750Mar 20, 2024Updated 2 years ago
- This repository contains a few examples of actions that can be added to rules within Elastic Security.☆24Feb 6, 2025Updated last year
- A small go harness that uses Ollama to orchestrate LLMs in a restricted process flow☆17Sep 10, 2024Updated last year
- Repository of Volatility3 plugins☆22Mar 22, 2023Updated 3 years ago
- Small tools to assist with using Large Language Models☆12Nov 7, 2023Updated 2 years ago
- My Notes from Hugging Face AI Agents Course☆19Feb 18, 2025Updated last year
- simple webapp for converting sigma rules into siem queries using the pySigma library☆50Sep 1, 2023Updated 2 years ago
- RedSage: A Cybersecurity Generalist LLM (ICLR'26)☆42Apr 24, 2026Updated 2 weeks ago
- Docker configurations for TheHive, Cortex and 3rd party tools☆129Jan 9, 2023Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- An extension of the sigma standard to include security metrics.☆16May 18, 2023Updated 2 years ago
- This repository hosts files relating to the TF-CSIRT Reference Security Incident Taxonomy Working Group.☆78Apr 4, 2025Updated last year
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆81Apr 27, 2024Updated 2 years ago
- SACTI - Securely aggregate CTI sightings and report them on MISP☆14Oct 24, 2022Updated 3 years ago
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆128Dec 5, 2023Updated 2 years ago
- This project aims to compare and evaluate the telemetry of various EDR products.☆1,953Apr 28, 2026Updated 2 weeks ago
- ☆11Jun 12, 2023Updated 2 years ago