bayegaspard / GoldMine
AI-powered tool designed to help security professionals detect vulnerabilities at machine speed and extract insights from extensive bug bounty reports. By leveraging Generative AI and Retrieval-Augmented Generation (RAG), GoldMine supercharges red-teaming operations and keeps you ahead in the cyber battle.
☆16Updated 8 months ago
Alternatives and similar repositories for GoldMine:
Users that are interested in GoldMine are comparing it to the libraries listed below
- A collection of agents that use Large Language Models (LLMs) to perform tasks common on our day to day jobs in cyber security.☆103Updated 11 months ago
- ☆242Updated 3 months ago
- ☆39Updated 4 months ago
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆52Updated last month
- CALDERA plugin for adversary emulation of AI-enabled systems☆95Updated last year
- ATLAS tactics, techniques, and case studies data☆64Updated this week
- NOVA: The Prompt Pattern Matching☆60Updated 2 weeks ago
- Cybersecurity Intelligent Pentesting Helper for Ethical Researcher (CIPHER). Fine tuned LLM for penetration testing guidance based on wri…☆21Updated 4 months ago
- 🤖 A GitHub action that leverages fabric patterns through an agent-based approach☆25Updated 3 months ago
- ☆36Updated 3 months ago
- Generate a MITRE ATT&CK Navigator based on a list of CVEs. Database with CVE, CWE, CAPEC, and MITRE ATT&CK Techniques data is updated dai…☆110Updated this week
- A comprehensive knowledge base for security professionals to keep track of and build defenses against API attack techniques.☆43Updated 7 months ago
- source code for the offsecml framework☆38Updated 10 months ago
- Delving into the Realm of LLM Security: An Exploration of Offensive and Defensive Tools, Unveiling Their Present Capabilities.☆162Updated last year
- AI-Powered Dark Web OSINT Tool☆36Updated this week
- A productionized greedy coordinate gradient (GCG) attack tool for large language models (LLMs)☆106Updated 4 months ago
- ☆43Updated 5 months ago
- The project serves as a strategic advisory tool, capitalizing on the ZySec series of AI models to amplify the capabilities of security pr…☆45Updated 11 months ago
- ☆102Updated 2 weeks ago
- ☆15Updated 2 weeks ago
- Tree of Attacks (TAP) Jailbreaking Implementation☆106Updated last year
- A LLM explicitly designed for getting hacked☆147Updated last year
- CyberBench: A Multi-Task Cyber LLM Benchmark☆14Updated last week
- ChainReactor is a research project that leverages AI planning to discover exploitation chains for privilege escalation on Unix systems. T…☆44Updated 5 months ago
- Awesome products for securing AI systems includes open source and commercial options and an infographic licensed CC-BY-SA-4.0.☆62Updated 10 months ago
- A research platform to develop automated security policies using quantitative methods, e.g., optimal control, computational game theory, …☆124Updated last month
- This is a dataset intended to train a LLM model for a completely CVE focused input and output.☆59Updated 5 months ago
- ☆11Updated last year
- ☆34Updated 3 months ago
- ☆87Updated 2 months ago