ZySec-AI / project-zysec
The project serves as a strategic advisory tool, capitalizing on the ZySec series of AI models to amplify the capabilities of security professionals in cyber defense and intelligence.
☆39Updated 5 months ago
Related projects ⓘ
Alternatives and complementary repositories for project-zysec
- ☆98Updated 5 months ago
- AI-powered tool designed to help producing Threat Intelligence Mindmap.☆74Updated last month
- ☆184Updated 3 months ago
- Save toil in security operations with: Detection & Intelligence Analysis for New Alerts (D.I.A.N.A. )☆148Updated 2 months ago
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆74Updated 10 months ago
- ☆82Updated 2 months ago
- ☆20Updated last month
- A collection of agents that use Large Language Models (LLMs) to perform tasks common on our day to day jobs in cyber security.☆55Updated 6 months ago
- Intel Retrieval Augmented Generation (RAG) Utilities☆87Updated 9 months ago
- HoneyAgents is a PoC demo of an AI-driven system that combines honeypots with autonomous AI agents to detect and mitigate cyber threats. …☆38Updated 10 months ago
- ATLAS tactics, techniques, and case studies data☆49Updated last month
- Advisories, guidance, best practice documents and more issued by members of the EU CSIRTs network, a network composed of EU Member States…☆50Updated this week
- Code for shelLM tool☆44Updated last week
- An IDE and translation engine for detection engineers and threat hunters. Be faster, write smarter, keep 100% privacy.☆129Updated this week
- Roota is a public-domain language of threat detection and response that combines native queries from a SIEM, EDR, XDR, or Data Lake with …☆116Updated 3 months ago
- Merge of two major cyber adversary datasets, MITRE ATT&CK and ETDA/ThaiCERT Threat Actor Cards, enabling victim/motivation-adversary-tech…☆50Updated 2 years ago
- ☆27Updated this week
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.☆50Updated 2 weeks ago
- ☆69Updated this week
- ☆14Updated this week
- Explore AI Supply Chain Risk with the AI Risk Database☆50Updated 6 months ago
- CALDERA plugin for adversary emulation of AI-enabled systems☆85Updated last year
- Intelligence around common attacker behaviors (MITRE ATT&CK TTPs), in the form of ATT&CK Navigator "layer" json files.☆34Updated 2 years ago
- ⚡ Vigil ⚡ Detect prompt injections, jailbreaks, and other potentially risky Large Language Model (LLM) inputs☆308Updated 9 months ago
- This directory features proven systems that demonstrate value to your threat-informed efforts using metrics.☆97Updated 8 months ago
- Vulnerability Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streaml…☆128Updated this week
- The Threat Actor Profile Guide for CTI Analysts☆96Updated last year
- Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogue…☆40Updated last month
- Intelligence Architecture Mind Map☆117Updated 7 months ago
- Dettectinator - The Python library to your DeTT&CT YAML files.☆104Updated this week