TheShadoru / AI-Cyber-WatchdogLinks
Private AI and Open source driven projects that can be used to help solve a plethora of security problems
☆19Updated last year
Alternatives and similar repositories for AI-Cyber-Watchdog
Users that are interested in AI-Cyber-Watchdog are comparing it to the libraries listed below
Sorting:
- CybGPT is at the forefront of integrating OpenAI's advanced GPT technology with the complex landscape of cybersecurity.☆41Updated last month
- ☆258Updated 3 weeks ago
- ☆44Updated 2 years ago
- ☆38Updated 8 months ago
- ☆375Updated last year
- Maturity models help integrate traditionally separate organizational functions, set process improvement goals and priorities, provide gui…☆254Updated 2 months ago
- NIST CyberSecurity Framework management tool☆166Updated 3 years ago
- A curated list of LLM driven Cyber security Resources☆36Updated 3 months ago
- Adversarial AI - Attacks, Mitigations, and Defense Strategies, published by Packt☆57Updated last year
- Save toil in security operations with: Detection & Intelligence Analysis for New Alerts (D.I.A.N.A. )☆211Updated last year
- This repository contains resources and materials for the "AI Agents and Retrieval Augmented Generation (RAG) for Cybersecurity Operations…☆88Updated 3 weeks ago
- NIST CSF Maturity Toolkit☆102Updated 3 months ago
- The project serves as a strategic advisory tool, capitalizing on the ZySec series of AI models to amplify the capabilities of security pr…☆61Updated last year
- Machine Learning-based tool for Cybersecurity Risk Assessment☆10Updated 4 years ago
- President's Cup Cybersecurity Competition Challenges☆176Updated 3 weeks ago
- OWASP Foundation Web Respository☆311Updated last week
- This GitHub page shows the CISO Tradecraft Podcast broken down by Topic☆132Updated last week
- ☆162Updated 3 months ago
- Welcome to the ultimate list of resources for AI in cybersecurity. This repository aims to provide an organized collection of high-qualit…☆77Updated last week
- Template SOC2 Policy Authority - documentation pipeline☆116Updated 4 years ago
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆79Updated last year
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆91Updated 3 weeks ago
- One Conference 2024☆110Updated 11 months ago
- ☆49Updated 9 months ago
- ☆309Updated last month
- Awesome list of AI for cybersecurity including network (network traffic analysis and intrusion detection), endpoint (anti-malware), appli…☆232Updated last year
- ☆48Updated 2 years ago
- These are files that a new CISO or someone introducing security to an organization can leverage to bridge the gap between security and th…☆72Updated 11 months ago
- CISA CSAF Security Advisories☆84Updated this week
- ☆60Updated 2 years ago