PacktPublishing / ChatGPT-for-Cybersecurity-CookbookLinks
ChatGPT for Cybersecurity Cookbook, published by Packt
☆139Updated last year
Alternatives and similar repositories for ChatGPT-for-Cybersecurity-Cookbook
Users that are interested in ChatGPT-for-Cybersecurity-Cookbook are comparing it to the libraries listed below
Sorting:
- some prompt about cyber security☆237Updated 2 years ago
- Awesome curate list of cyber security penetration testing tools for Cloud Security mainly AWS/Azure/Google☆124Updated 4 years ago
- an extension for Burp Suite to allow researchers to utilize GPT for analys is of HTTP requests and responses☆113Updated 2 years ago
- Vulnerability scanner for AWS customer managed policies using ChatGPT☆166Updated 2 years ago
- Delving into the Realm of LLM Security: An Exploration of Offensive and Defensive Tools, Unveiling Their Present Capabilities.☆164Updated last year
- Awesome list of keywords and artifacts for Threat Hunting sessions☆599Updated 3 weeks ago
- A collection of agents that use Large Language Models (LLMs) to perform tasks common on our day to day jobs in cyber security.☆152Updated last year
- DevSecOpsGuides☆190Updated 4 months ago
- A collection of phishing samples for researchers and detection developers.☆343Updated 2 weeks ago
- AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE…☆1,180Updated 3 months ago
- This repository contains resources and materials for the "AI Agents and Retrieval Augmented Generation (RAG) for Cybersecurity Operations…☆81Updated last week
- Streamline vulnerability patching with CVSS, EPSS, and CISA's Known Exploited Vulnerabilities. Prioritize actions based on real-time thre…☆663Updated last month
- Awesome list for cloud security related projects☆131Updated 2 years ago
- Downloads Information from NIST (CVSS), first.org (EPSS), and CISA (Exploited Vulnerabilities) and combines them into one list. Reports f…☆144Updated 2 years ago
- ☆314Updated last year
- Vulnerability-Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streaml…☆359Updated this week
- Suricata rules that can detect a wide range of threats, including malware, exploits, and other malicious activity especially web applicat…☆51Updated last year
- A collection of Active Directory, phishing, mobile technology, system, service, web application, and wireless technology weaknesses that …☆251Updated 2 years ago
- ☆135Updated last year
- A collection of files with indicators supporting social media posts from Palo Alto Network's Unit 42 team to disseminate timely threat in…☆363Updated last week
- An open-source self-hosted purple team management web application.☆286Updated last week
- A curated list of large language model tools for cybersecurity research.☆470Updated last year
- Top ATT&CK Techniques helps defenders approach the breadth and complexity of MITRE ATT&CK® with a prioritized top 10 list of techniques t…☆119Updated 3 months ago
- Practical Windows Forensics Training☆683Updated last year
- Cover various security approaches to attack techniques and also provides new discoveries about security breaches.☆482Updated 4 months ago
- Incident Response with Threat Intelligence, published by Packt☆53Updated last year
- ☆258Updated 7 months ago
- Useful resources about phishing email analysis☆85Updated 6 months ago
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆361Updated last week
- Curated list of open-source & paid Attack Surface Monitoring (ASM) tools.☆426Updated 10 months ago