PacktPublishing / ChatGPT-for-Cybersecurity-Cookbook
ChatGPT for Cybersecurity Cookbook, published by Packt
☆127Updated last year
Alternatives and similar repositories for ChatGPT-for-Cybersecurity-Cookbook:
Users that are interested in ChatGPT-for-Cybersecurity-Cookbook are comparing it to the libraries listed below
- some prompt about cyber security☆198Updated last year
- Awesome list for cloud security related projects☆120Updated 2 years ago
- A curated list of cloud pentesting resource, contains AWS, Azure, Google Cloud☆118Updated 2 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆92Updated 2 years ago
- Vulnerability scanner for AWS customer managed policies using ChatGPT☆162Updated 2 years ago
- Awesome curate list of cyber security penetration testing tools for Cloud Security mainly AWS/Azure/Google☆123Updated 4 years ago
- Top ATT&CK Techniques helps defenders approach the breadth and complexity of MITRE ATT&CK® with a prioritized top 10 list of techniques t…☆118Updated last month
- Delving into the Realm of LLM Security: An Exploration of Offensive and Defensive Tools, Unveiling Their Present Capabilities.☆162Updated last year
- A LLM explicitly designed for getting hacked☆147Updated last year
- An automated Breach and Attack Simulation lab with terraform. Built for IaC stability, consistency, and speed.☆189Updated 9 months ago
- ☆173Updated last year
- Downloads Information from NIST (CVSS), first.org (EPSS), and CISA (Exploited Vulnerabilities) and combines them into one list. Reports f…☆141Updated 2 years ago
- List of questions, answers and random notes for security interviews☆69Updated 3 years ago
- ☆315Updated 9 months ago
- Cybersecurity Notes☆159Updated last year
- CISSP and CCSP study material repository. ISC2.☆300Updated 6 months ago
- A collection of awesome resources related AI security☆206Updated this week
- Cyber Threat Intelligence Data, Indicators, and Analysis☆84Updated 4 months ago
- Awesome list of keywords and artifacts for Threat Hunting sessions☆563Updated last month
- ☆239Updated 3 months ago
- DECeption with Evaluative Integrated Validation Engine (DECEIVE): Let an LLM do all the hard honeypot work!☆237Updated last month
- Cover various security approaches to attack techniques and also provides new discoveries about security breaches.☆473Updated last week
- ☆208Updated 3 years ago
- CSbyGB PenTips Gitbook☆109Updated last month
- Repository resource for threat hunter☆158Updated 6 years ago
- Automating Security Detection Engineering, published by Packt☆54Updated 6 months ago
- Compilation of Resources from TCM's Practical Ethical Hacking Udemy Course☆122Updated 3 years ago
- Useful resources about phishing email analysis☆82Updated 2 months ago
- ☆132Updated last year
- ☆47Updated last month