aica-iwg / aica-agent
This project will work towards a fully-functional autonomous intelligent cyberdefense agent with increasingly advanced capabilities that can be used in both research and production contexts.
☆30Updated last week
Alternatives and similar repositories for aica-agent:
Users that are interested in aica-agent are comparing it to the libraries listed below
- A collection of agents that use Large Language Models (LLMs) to perform tasks common on our day to day jobs in cyber security.☆80Updated 8 months ago
- HoneyAgents is a PoC demo of an AI-driven system that combines honeypots with autonomous AI agents to detect and mitigate cyber threats. …☆39Updated last year
- AI-powered tool designed to help producing Threat Intelligence Mindmap.☆83Updated 3 weeks ago
- GPT-3 use cases for Cybersecurity☆52Updated last year
- The project serves as a strategic advisory tool, capitalizing on the ZySec series of AI models to amplify the capabilities of security pr…☆43Updated 8 months ago
- ☆27Updated 2 months ago
- OpenCTI datasets☆26Updated 10 months ago
- A research platform to develop automated security policies using quantitative methods, e.g., optimal control, computational game theory, …☆124Updated this week
- ATLAS tactics, techniques, and case studies data☆54Updated 3 months ago
- YAWNING TITAN is an abstract, graph based cyber-security simulation environment that supports the training of intelligent agents for auto…☆59Updated 8 months ago
- Sensor Mappings to ATT&CK is a collection of resources to assist cyber defenders with understanding which sensors and events can help det…☆49Updated 7 months ago
- An environment simulation for networks security tasks for development and testing AI based agents. Part of AI Dojo project☆43Updated this week
- Agentic Workflows Made Simple☆94Updated this week
- SMET : Semantic Mapping of CVE to ATT&CK and its Application to Cybersecurity☆40Updated 4 months ago
- AI-enabled Cybersecurity for Future Smart Environments☆21Updated 5 months ago
- ☆101Updated 7 months ago
- Security Control Knowledge Graph☆26Updated 9 months ago
- ☆12Updated last year
- "Linking Threat Tactics, Techniques, and Patterns with Defensive Weaknesses, Vulnerabilities and Affected Platform Configurations for Cyb…☆92Updated 6 months ago
- This repository contains resources and materials for the "Using Retrieval Augmented Generation (RAG), Langchain, and LLMs for Cybersecuri…☆25Updated 2 weeks ago
- Generative AI Governance for Enterprises☆14Updated last month
- CLI tool for interacting with GPT, analyze local files, etc.☆15Updated 7 months ago
- Strelka Web UI for File Submission and Analysis☆62Updated 5 months ago
- Neo4j Cybersecurity Demo☆17Updated 2 years ago
- This repository serves as a comprehensive resource for integrating machine learning with security operations, offering innovative cyberse…☆20Updated last year
- ☆86Updated 5 months ago
- Crews Control is an abstraction layer on top of crewAI, designed to facilitate the creation and execution of AI-driven projects without w…☆27Updated this week
- A collection of dashboards, templates, API's and Power BI code for vulnerability management and analysis☆13Updated 2 months ago
- An extended version of SecureBERT, trained on top of both base and large version of RoBERTa using 10 GB cybersecurity-related data☆17Updated last year
- ☆37Updated 9 months ago