☆108Jun 2, 2024Updated last year
Alternatives and similar repositories for GenAI-Security-Adventures
Users that are interested in GenAI-Security-Adventures are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Intel Retrieval Augmented Generation (RAG) Utilities☆90Jan 29, 2024Updated 2 years ago
- Summarize CTI reports with OpenAI☆18Updated this week
- ☆44Jul 11, 2025Updated 9 months ago
- Powershell Functions to interact with TheHive-Project☆11Jun 27, 2019Updated 6 years ago
- Private Search Set (PSS) is an extension to standard Bloom filter or a standalone hash file to describe and share private set.☆16Jan 10, 2025Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Open-source Fabric templates for cybersecurity and compliance☆32Jan 13, 2025Updated last year
- Jupyter Univere is a search engine for all infosec jupyter notebooks☆36Mar 24, 2025Updated last year
- AI-powered tool designed to help producing Threat Intelligence Mindmap.☆108Feb 16, 2026Updated 2 months ago
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆154Apr 25, 2022Updated 3 years ago
- Attack Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by devel…☆727Nov 14, 2025Updated 5 months ago
- Python Script to access ATT&CK content available in STIX via a public TAXII server☆12Dec 21, 2024Updated last year
- ☆10May 25, 2023Updated 2 years ago
- Command-line tool for discovering SaaS platforms a company uses via DNS enumeration☆40Jul 23, 2025Updated 8 months ago
- Collection of Jupyter Notebooks by @fr0gger_☆195Dec 16, 2025Updated 4 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆261May 9, 2024Updated last year
- Ludus range for the Constructing Defense Lab☆118Apr 5, 2026Updated 2 weeks ago
- AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE…☆1,216Dec 29, 2025Updated 3 months ago
- simple C# portscanner - written for playing around with Metasploit's Execute-Assembly☆10Jul 1, 2023Updated 2 years ago
- Active C&C Detector☆156Oct 5, 2023Updated 2 years ago
- Scripts to help and speed up reversing activities☆13Jan 12, 2026Updated 3 months ago
- RedSage: A Cybersecurity Generalist LLM (ICLR'26)☆39Apr 7, 2026Updated last week
- ☆109Dec 9, 2025Updated 4 months ago
- Cobalt Strike log state tracking, parsing, and storage☆24Jul 18, 2019Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A cyber threat intelligence chatbot that ingested 2200+ reports from vx-underground.☆33Apr 1, 2024Updated 2 years ago
- Re-play Security Events☆1,734Mar 20, 2024Updated 2 years ago
- This repository contains a few examples of actions that can be added to rules within Elastic Security.☆24Feb 6, 2025Updated last year
- A small go harness that uses Ollama to orchestrate LLMs in a restricted process flow☆17Sep 10, 2024Updated last year
- Repository of Volatility3 plugins☆22Mar 22, 2023Updated 3 years ago
- Small tools to assist with using Large Language Models☆12Nov 7, 2023Updated 2 years ago
- My Notes from Hugging Face AI Agents Course☆19Feb 18, 2025Updated last year
- simple webapp for converting sigma rules into siem queries using the pySigma library☆50Sep 1, 2023Updated 2 years ago
- Docker configurations for TheHive, Cortex and 3rd party tools☆129Jan 9, 2023Updated 3 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- An extension of the sigma standard to include security metrics.☆16May 18, 2023Updated 2 years ago
- This repository hosts files relating to the TF-CSIRT Reference Security Incident Taxonomy Working Group.☆77Apr 4, 2025Updated last year
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆82Apr 27, 2024Updated last year
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆128Dec 5, 2023Updated 2 years ago
- SACTI - Securely aggregate CTI sightings and report them on MISP☆14Oct 24, 2022Updated 3 years ago
- This project aims to compare and evaluate the telemetry of various EDR products.☆1,944Mar 26, 2026Updated 3 weeks ago
- MISP sighting server is a fast sighting server to store and look-up sightings on attributes (network indicators, file hashes, system indi…☆15Dec 24, 2023Updated 2 years ago