The project serves as a strategic advisory tool, capitalizing on the ZySec series of AI models to amplify the capabilities of security professionals in cyber defense and intelligence.
☆68May 19, 2024Updated last year
Alternatives and similar repositories for project-zysec
Users that are interested in project-zysec are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This repo contains the codes for the experiments of the paper "AutoPenBench: Benchmarking Generative Agents for Penetration Testing".☆14Oct 28, 2025Updated 5 months ago
- Welcome to MitreMesh. Where MITRE's framework meets dynamic scenario generation, creating a comprehensive net of incident response tests …☆17Sep 5, 2023Updated 2 years ago
- MCP Snitch is a macOS application that intercepts and monitors MCP server communications, providing security analysis, access control, an…☆93Oct 14, 2025Updated 6 months ago
- Cybersecurity Intelligent Pentesting Helper for Ethical Researcher (CIPHER). Fine tuned LLM for penetration testing guidance based on wri…☆37Dec 24, 2024Updated last year
- Incident Response Methodologies (IRM), also called Incident Playbook, based on the work done by the CERT Societe General☆24Dec 16, 2021Updated 4 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Automating Cyber Threat Intelligence Reporting with Natural Language Generation☆15Jan 24, 2024Updated 2 years ago
- Training and support materials for MSTICPy☆18Jun 27, 2023Updated 2 years ago
- Quick access to any large language model from your browser.☆10Feb 16, 2026Updated last month
- Private AI and Open source driven projects that can be used to help solve a plethora of security problems☆19Sep 7, 2024Updated last year
- The repository of paper "HackMentor: Fine-Tuning Large Language Models for Cybersecurity".☆139May 30, 2024Updated last year
- Automated discovery and exploitation of security vulnerabilities using natural language and LLMs.☆21Feb 27, 2026Updated last month
- This project is a deliberately vulnerable environment to learn about LLM-specific risks based on the OWASP Top 10 for LLM Applications.☆52Jan 19, 2026Updated 2 months ago
- Malicious PowerShell Dataset☆27Aug 8, 2023Updated 2 years ago
- AI agent for autonomous cyber operations☆512Nov 29, 2025Updated 4 months ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- This is a working copy of the OWASP Project Handbook and is the draft where changes are made before publishing a final version on the OWA…☆19Feb 22, 2017Updated 9 years ago
- ☆24May 24, 2025Updated 10 months ago
- In-the-wild deepfake detection dataset☆13Mar 5, 2025Updated last year
- [NeurIPS'24] RedCode: Risky Code Execution and Generation Benchmark for Code Agents☆70Nov 14, 2025Updated 5 months ago
- The SAP Threat Modeling Tool is an on-premises open-source web application designed to analyze and visualize connections between SAP syst…☆52Mar 7, 2025Updated last year
- CVSS v4.0 calculator☆39Aug 19, 2024Updated last year
- Demo of fine-tuning QA models for answering FAQ of cloud providers documentation☆11Mar 7, 2023Updated 3 years ago
- Get up and running with Llama 2 and other large language models locally☆15Updated this week
- WiP - cve-search next gen☆13Jan 18, 2020Updated 6 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Leverage the Intel® Distribution of OpenVINO™ Toolkit to fast-track development of high-performance computer vision and deep learning inf…☆10Jul 28, 2020Updated 5 years ago
- OWASP Web Security Testing Guide RAG system with ChromaDB, MCP for Claude Code☆20Dec 11, 2025Updated 4 months ago
- ☆23Dec 13, 2023Updated 2 years ago
- Precision Knowledge Editing (PKE): A novel method to reduce toxicity in LLMs while preserving performance, with robust evaluations and ha…☆11Nov 26, 2024Updated last year
- Intel® Generic Implementation of LAGraph* for Go*☆11Feb 23, 2026Updated last month
- Working Group on Artificial Intelligence and Machine Learning (AI/ML) Security☆161Dec 19, 2025Updated 3 months ago
- AI-powered tool designed to help producing Threat Intelligence Mindmap.☆108Feb 16, 2026Updated last month
- ☆17Nov 11, 2021Updated 4 years ago
- Parse and Convert a Dockerfile to Bash script.☆11Apr 20, 2018Updated 7 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- LiteLLM model integration for Pydantic AI framework - access 100+ LLM providers through a unified interface☆21Nov 19, 2025Updated 4 months ago
- This script searches NVD's website for new CVES, alerting you by email or telegram. You can configure a list of products that interest yo…☆11Mar 21, 2021Updated 5 years ago
- ☆38Jan 30, 2025Updated last year
- AI featured threat modeling and security review action☆46Nov 17, 2024Updated last year
- RuleVis is a powerful analysis tool that transforms your Wazuh ruleset into a dynamic, interactive force-directed graph. It helps you vis…☆25Nov 12, 2025Updated 5 months ago
- Application scanning component of OWASP PurpleTeam☆15Feb 12, 2023Updated 3 years ago
- An overview of LLMs for cybersecurity.☆1,284Mar 18, 2026Updated 3 weeks ago