cybershujin / AI-for-CybersecurityLinks
☆51Updated 10 months ago
Alternatives and similar repositories for AI-for-Cybersecurity
Users that are interested in AI-for-Cybersecurity are comparing it to the libraries listed below
Sorting:
- ☆260Updated last month
- ☆116Updated 4 months ago
- A curated list of LLM driven Cyber security Resources☆36Updated 4 months ago
- Collection of Jupyter Notebooks by @fr0gger_☆179Updated this week
- Extracts IoCs, TTPs and the relationships between them. Outputs a STIX 2.1 bundle.☆72Updated last week
- ☆107Updated last year
- Knowledge base on cybercriminal concealment techniques☆78Updated 5 months ago
- ☆42Updated 9 months ago
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆100Updated last year
- A starter pack of resources to help you get started in Detection Engineering.☆172Updated last month
- ☆96Updated 2 months ago
- Save toil in security operations with: Detection & Intelligence Analysis for New Alerts (D.I.A.N.A. )☆215Updated last year
- Automating Security Detection Engineering, published by Packt☆62Updated 11 months ago
- DECeption with Evaluative Integrated Validation Engine (DECEIVE): Let an LLM do all the hard honeypot work!☆264Updated 3 months ago
- A collection of companies that disclose adversary TTPs after they have been breached☆246Updated last year
- ☆56Updated 5 months ago
- ☆317Updated 2 weeks ago
- Intel Retrieval Augmented Generation (RAG) Utilities☆90Updated last year
- Curated resources, research, and tools for securing AI systems☆133Updated this week
- The Threat Actor Profile Guide for CTI Analysts☆114Updated 2 years ago
- ATT&CK Data Model (ADM): A TypeScript library for structured interaction with MITRE ATT&CK datasets. Uses Zod schemas, TypeScript types, …☆41Updated this week
- Mapping of open-source detection rules and atomic tests.☆177Updated 8 months ago
- ☆134Updated last year
- ☆49Updated 2 weeks ago
- A collection of agents that use Large Language Models (LLMs) to perform tasks common on our day to day jobs in cyber security.☆178Updated last year
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆125Updated last year
- ☆185Updated last year
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆266Updated 6 months ago
- Jupyter Univere is a search engine for all infosec jupyter notebooks☆31Updated 6 months ago
- MISP Playbooks☆211Updated 3 months ago