ZySec-AI / project-zysecLinks
The project serves as a strategic advisory tool, capitalizing on the ZySec series of AI models to amplify the capabilities of security professionals in cyber defense and intelligence.
☆52Updated last year
Alternatives and similar repositories for project-zysec
Users that are interested in project-zysec are comparing it to the libraries listed below
Sorting:
- ☆50Updated 2 months ago
- ATLAS tactics, techniques, and case studies data☆76Updated 2 months ago
- ☆253Updated 5 months ago
- Top 10 for Agentic AI (AI Agent Security) serves as the core for OWASP and CSA Red teaming work☆115Updated last month
- A collection of agents that use Large Language Models (LLMs) to perform tasks common on our day to day jobs in cyber security.☆136Updated last year
- AI-powered tool designed to help producing Threat Intelligence Mindmap.☆98Updated last month
- The objective of this program is to leverage AI-LLM technology to process of human language-based CTI documents to succinctly summarize t…☆55Updated last month
- Save toil in security operations with: Detection & Intelligence Analysis for New Alerts (D.I.A.N.A. )☆186Updated 10 months ago
- A curated list of MLSecOps tools, articles and other resources on security applied to Machine Learning and MLOps systems.☆335Updated 6 months ago
- ☆105Updated last year
- OWASP Foundation Web Respository☆282Updated 2 weeks ago
- A collection of awesome resources related AI security☆258Updated 3 weeks ago
- Extracts IoCs, TTPs and the relationships between them. Outputs a STIX 2.1 bundle.☆61Updated this week
- ⚡ Vigil ⚡ Detect prompt injections, jailbreaks, and other potentially risky Large Language Model (LLM) inputs☆396Updated last year
- A curated list of large language model tools for cybersecurity research.☆465Updated last year
- HoneyAgents is a PoC demo of an AI-driven system that combines honeypots with autonomous AI agents to detect and mitigate cyber threats. …☆53Updated last year
- NOVA: The Prompt Pattern Matching☆128Updated 2 months ago
- Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogue…☆67Updated this week
- 🤖 A GitHub action that leverages fabric patterns through an agent-based approach☆28Updated 6 months ago
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆89Updated 2 months ago
- ☆274Updated last week
- CALDERA plugin for adversary emulation of AI-enabled systems☆99Updated last year
- ☆47Updated 7 months ago
- Delving into the Realm of LLM Security: An Exploration of Offensive and Defensive Tools, Unveiling Their Present Capabilities.☆163Updated last year
- ☆41Updated 7 months ago
- This project will work towards a fully-functional autonomous intelligent cyberdefense agent with increasingly advanced capabilities that …☆30Updated 5 months ago
- ☆37Updated 6 months ago
- This repository contains resources and materials for the "AI Agents and Retrieval Augmented Generation (RAG) for Cybersecurity Operations…☆60Updated 2 weeks ago
- 🚨ATTENTION🚨 The CVE mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here as…☆238Updated last year
- Open Source Tool - Cybersecurity Graph Database in Neo4j☆61Updated last year