bayegaspard / GoldMineLinks
AI-powered tool designed to help security professionals detect vulnerabilities at machine speed and extract insights from extensive bug bounty reports. By leveraging Generative AI and Retrieval-Augmented Generation (RAG), GoldMine supercharges red-teaming operations and keeps you ahead in the cyber battle.
☆16Updated 10 months ago
Alternatives and similar repositories for GoldMine
Users that are interested in GoldMine are comparing it to the libraries listed below
Sorting:
- ☆254Updated 6 months ago
- Learn AI security through a series of vulnerable LLM CTF challenges. No sign ups, no cloud fees, run everything locally on your system.☆291Updated 10 months ago
- A collection of agents that use Large Language Models (LLMs) to perform tasks common on our day to day jobs in cyber security.☆136Updated last year
- Generate a MITRE ATT&CK Navigator based on a list of CVEs. Database with CVE, CWE, CAPEC, and MITRE ATT&CK Techniques data is updated dai…☆171Updated this week
- NOVA: The Prompt Pattern Matching☆128Updated 2 months ago
- Delving into the Realm of LLM Security: An Exploration of Offensive and Defensive Tools, Unveiling Their Present Capabilities.☆163Updated last year
- ☆47Updated 7 months ago
- ☆41Updated 7 months ago
- AIGoat: A deliberately Vulnerable AI Infrastructure. Learn AI security through solving our challenges.☆237Updated 2 months ago
- A research platform to develop automated security policies using quantitative methods, e.g., optimal control, computational game theory, …☆128Updated last week
- This repository contains resources and materials for the "AI Agents and Retrieval Augmented Generation (RAG) for Cybersecurity Operations…☆60Updated 3 weeks ago
- ☆37Updated 6 months ago
- A curated list of MLSecOps tools, articles and other resources on security applied to Machine Learning and MLOps systems.☆335Updated 6 months ago
- A LLM explicitly designed for getting hacked☆153Updated last year
- Cybersecurity Intelligent Pentesting Helper for Ethical Researcher (CIPHER). Fine tuned LLM for penetration testing guidance based on wri…☆25Updated 6 months ago
- ☆50Updated 2 months ago
- A curated list of LLM driven Cyber security Resources☆32Updated last month
- ☆279Updated 2 weeks ago
- ATLAS tactics, techniques, and case studies data☆76Updated 2 months ago
- A collection of awesome resources related AI security☆258Updated 3 weeks ago
- CALDERA plugin for adversary emulation of AI-enabled systems☆100Updated last year
- OWASP Foundation Web Respository☆282Updated 3 weeks ago
- ☆41Updated this week
- ☆108Updated last month
- SOC Analyst Level 1 Replacement using RAG LLM☆22Updated 11 months ago
- Adversarial AI - Attacks, Mitigations, and Defense Strategies, published by Packt☆49Updated 11 months ago
- AI-enabled Cybersecurity for Future Smart Environments☆24Updated 11 months ago
- Payloads for AI Red Teaming and beyond☆115Updated this week
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆89Updated 2 months ago
- This is the Network Flow Generator for ICSSIM☆14Updated 3 months ago