anshumanbh / cyber-safariLinks
A fun POC that is built to understand AI security agents.
☆34Updated 2 weeks ago
Alternatives and similar repositories for cyber-safari
Users that are interested in cyber-safari are comparing it to the libraries listed below
Sorting:
- LLM Testing Findings Templates☆75Updated last year
- An experimental project using LLM technology to generate security documentation for Open Source Software (OSS) projects☆34Updated 8 months ago
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆97Updated last month
- Vulnerability impact analyzer that reduces false positives in SCA tools by performing intelligent code analysis. Uses agentic AI with ope…☆61Updated 8 months ago
- InfoSec OpenAI Examples☆19Updated last year
- An LLM and OCR based Indicator of Compromise Extraction Tool☆37Updated 11 months ago
- ☆55Updated 2 years ago
- GCP GOAT is the vulnerable application for learn the GCP Security☆68Updated 5 months ago
- ☆17Updated 7 months ago
- ☆114Updated 2 years ago
- ☆63Updated 5 months ago
- ☆43Updated 3 weeks ago
- Build a CVE library with aggregated CISA, EPSS and CVSS data☆29Updated 2 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆32Updated 3 years ago
- ☆41Updated 11 months ago
- Maturity Model Collaborative project☆15Updated 2 years ago
- A PoC to Simulate Ransomware Attack on AWS Environment☆32Updated last year
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆101Updated last year
- A simple web app to get the latest EPSS data for a CVE ID☆11Updated 7 months ago
- A GitHub Actions Supply Chain CTF / Goat☆26Updated last week
- ☆50Updated last year
- ☆60Updated 2 years ago
- A tool to keep AWS pentests and red teams efficient, organized, and stealthy.☆96Updated last year
- Code Repository for: AIRTBench: Measuring Autonomous AI Red Teaming Capabilities in Language Models☆90Updated this week
- ☆166Updated last month
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆67Updated 4 months ago
- Short deep dive into Threat Hunting on AWS☆14Updated 2 years ago
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆42Updated last year
- IMDSPOOF is a cyber deception tool that spoofs the AWS IMDS service to return HoneyTokens that can be alerted on.☆107Updated last year
- 📚A curated list of product security resources.☆21Updated 5 months ago