TheShadoru / AI-Cyber-WatchdogLinks
Private AI and Open source driven projects that can be used to help solve a plethora of security problems
☆19Updated 9 months ago
Alternatives and similar repositories for AI-Cyber-Watchdog
Users that are interested in AI-Cyber-Watchdog are comparing it to the libraries listed below
Sorting:
- ☆247Updated 4 months ago
- CybGPT is at the forefront of integrating OpenAI's advanced GPT technology with the complex landscape of cybersecurity.☆41Updated 2 weeks ago
- The project serves as a strategic advisory tool, capitalizing on the ZySec series of AI models to amplify the capabilities of security pr…☆49Updated last year
- Machine Learning-based tool for Cybersecurity Risk Assessment☆10Updated 3 years ago
- Save toil in security operations with: Detection & Intelligence Analysis for New Alerts (D.I.A.N.A. )☆183Updated 9 months ago
- Knowledge base on cybercriminal concealment techniques☆69Updated last month
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆87Updated last year
- Security Operation Center Lab☆19Updated 7 months ago
- ☆40Updated last year
- Vulnerability impact analyzer that reduces false positives in SCA tools by performing intelligent code analysis. Uses agentic AI with ope…☆55Updated 3 months ago
- NIST CyberSecurity Framework management tool☆165Updated 3 years ago
- A curated list of LLM driven Cyber security Resources☆31Updated last week
- ☆46Updated last year
- One Conference 2024☆110Updated 8 months ago
- NOVA: The Prompt Pattern Matching☆114Updated last month
- Automating Security Detection Engineering, published by Packt☆54Updated 7 months ago
- Practical Threat Detection Engineering, Published by Packt☆71Updated last year
- A cheatsheet containing AWS CloudTrail events that can be used for Incident Response purposes or Detection Engineering.☆74Updated last year
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆75Updated last year
- ✨ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The …☆278Updated last year
- Cloud Offensive Breach and Risk Assessment (COBRA) Tool☆92Updated 2 weeks ago
- Collection of Jupyter Notebooks by @fr0gger_☆165Updated this week
- ☆36Updated 5 months ago
- KEV EPSS Data☆25Updated this week
- ☆104Updated last year
- An open-source listing of cybersecurity technology mapped to the NIST Cybersecurity Framework (CSF)☆119Updated 10 months ago
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆254Updated 2 months ago
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆97Updated last year
- ☆104Updated last week
- Maturity models help integrate traditionally separate organizational functions, set process improvement goals and priorities, provide gui…☆237Updated last month