cybershujin / AI-for-Cybersecurity
☆43Updated 5 months ago
Alternatives and similar repositories for AI-for-Cybersecurity
Users that are interested in AI-for-Cybersecurity are comparing it to the libraries listed below
Sorting:
- ☆243Updated 4 months ago
- NOVA: The Prompt Pattern Matching☆80Updated 2 weeks ago
- ☆103Updated this week
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆87Updated last year
- Intel Retrieval Augmented Generation (RAG) Utilities☆91Updated last year
- ☆39Updated 5 months ago
- Extracts IoCs, TTPs and the relationships between them. Outputs a STIX 2.1 bundle.☆54Updated last week
- ATLAS tactics, techniques, and case studies data☆71Updated 3 weeks ago
- ☆33Updated 6 months ago
- The project serves as a strategic advisory tool, capitalizing on the ZySec series of AI models to amplify the capabilities of security pr…☆48Updated 11 months ago
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆53Updated 2 months ago
- Save toil in security operations with: Detection & Intelligence Analysis for New Alerts (D.I.A.N.A. )☆181Updated 8 months ago
- AI-powered tool designed to help producing Threat Intelligence Mindmap.☆93Updated this week
- One Conference 2024☆109Updated 7 months ago
- ☆48Updated last week
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆123Updated last year
- Knowledge base on cybercriminal concealment techniques☆64Updated last week
- A collection of agents that use Large Language Models (LLMs) to perform tasks common on our day to day jobs in cyber security.☆111Updated last year
- ☆39Updated last week
- ☆104Updated 11 months ago
- ☆88Updated 3 months ago
- ☆36Updated 4 months ago
- AI-Powered, Local Pythonic Coding Agent 🐞💻☆23Updated 2 months ago
- Practical Threat Detection Engineering, Published by Packt☆68Updated last year
- SECurityTr8Ker monitors the SEC's RSS feed for 8-K filings with cybersecurity incident disclosures.☆77Updated this week
- TIE is a machine learning model for inferring associated MITRE ATT&CK techniques from previously observed techniques.☆50Updated 3 weeks ago
- A LLM explicitly designed for getting hacked☆149Updated last year
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆88Updated 6 months ago
- This directory features proven systems that demonstrate value to your threat-informed efforts using metrics.☆111Updated 5 months ago
- ☆133Updated last year