cybershujin / AI-for-CybersecurityView external linksLinks
☆54Nov 23, 2024Updated last year
Alternatives and similar repositories for AI-for-Cybersecurity
Users that are interested in AI-for-Cybersecurity are comparing it to the libraries listed below
Sorting:
- An Inspect extension for agentic cyber evaluations☆21Feb 6, 2026Updated last week
- A curated list of LLM driven Cyber security Resources☆45Oct 20, 2025Updated 3 months ago
- Chapter 9: Disseminate☆16Sep 6, 2017Updated 8 years ago
- AI-based implant feature☆25Apr 28, 2025Updated 9 months ago
- ☆22Dec 30, 2025Updated last month
- ☆22Jun 9, 2025Updated 8 months ago
- Bloodhound agent for Mythic☆24Apr 19, 2025Updated 9 months ago
- Mythic Developer Series: Workshop Golang Agent☆26Jun 27, 2023Updated 2 years ago
- Nemesis agent for Mythic☆28Dec 11, 2025Updated 2 months ago
- A summary of the most abbreviations I encountered so far☆28Jan 18, 2026Updated 3 weeks ago
- Project repository for "Evaluating the persuasive influence of political microtargeting with large language models" by Kobi Hackenburg an…☆11Jun 19, 2024Updated last year
- Awesome list of AI for cybersecurity including network (network traffic analysis and intrusion detection), endpoint (anti-malware), appli…☆236Oct 3, 2023Updated 2 years ago
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆42Jan 20, 2026Updated 3 weeks ago
- OpenCTI Add-On for Splunk☆13Jan 13, 2026Updated last month
- Pivot from a Twitter profile to Medium, Product Hunt, Mastodon, and more with OSINT☆37Feb 26, 2024Updated last year
- Provides an easy way to collect and send Slack access & integration logs.☆13Oct 19, 2021Updated 4 years ago
- Taranis NG is an OSINT gathering and analysis tool for CSIRT teams and organisations. It allows team-to-team collaboration, and contains …☆10Oct 17, 2023Updated 2 years ago
- OpenSelfie is an Open Source (hardware and software) photobooth based on the Raspberry Pi and Wyolum's AlaMode☆15Oct 15, 2015Updated 10 years ago
- Sage Math recompiled to run on the Raspberry Pi☆15Oct 9, 2015Updated 10 years ago
- RuleVis is a powerful analysis tool that transforms your Wazuh ruleset into a dynamic, interactive force-directed graph. It helps you vis…☆23Nov 12, 2025Updated 3 months ago
- ☆10Nov 29, 2025Updated 2 months ago
- Machine Learning-based tool for Cybersecurity Risk Assessment☆11Jul 18, 2021Updated 4 years ago
- Integration of fluent-bit and Splunk using the HTTP Event Collector (Splunk HEC)☆10Oct 16, 2018Updated 7 years ago
- ☆13Jun 27, 2024Updated last year
- This script searches NVD's website for new CVES, alerting you by email or telegram. You can configure a list of products that interest yo…☆11Mar 21, 2021Updated 4 years ago
- ☆11Dec 9, 2025Updated 2 months ago
- 🗞 Monitors data sources, alerts you when they change☆13Jul 23, 2021Updated 4 years ago
- A common database library for managing and querying security data☆18Jan 12, 2026Updated last month
- ESP32_CAM meets Etch-A-Sketch => Etch-a-Selfie☆12Jul 30, 2019Updated 6 years ago
- Assorted, MIT licensed, threat hunting rules from @bradleyjkemp☆14Mar 11, 2022Updated 3 years ago
- DNSCat PNG Extractor is a Python tool designed for the extraction of PNG image data from DNS exfiltration attempts using DNScat☆10Nov 15, 2023Updated 2 years ago
- Help deobfuscate VBScript☆18Jul 1, 2022Updated 3 years ago
- CIS benchmark quickplay for rapid assessments of the NGFW☆13Jul 27, 2023Updated 2 years ago
- Machine Learning basics with phishing dataset☆10Apr 19, 2021Updated 4 years ago
- A tool to sync mythic events with ghostwriter oplog.☆14Nov 21, 2024Updated last year
- List of links and resources referred to in my SANS OSINT Summit 2024 Talk "OSINT On The Russian Internet"☆11Feb 29, 2024Updated last year
- Official Black Hat Arsenal Security Tools Repository☆10Aug 12, 2017Updated 8 years ago
- ☆12Jan 17, 2026Updated last month
- Python implementation of the Abelian Sandpile Model (Per Bak, Chao Tang, & Kurt Wiesenfeld, 1987)☆10Apr 19, 2015Updated 10 years ago