cybershujin / AI-for-Cybersecurity
☆36Updated 3 months ago
Alternatives and similar repositories for AI-for-Cybersecurity:
Users that are interested in AI-for-Cybersecurity are comparing it to the libraries listed below
- ☆225Updated last month
- ☆37Updated 3 months ago
- ☆101Updated last month
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆85Updated last year
- ☆103Updated 9 months ago
- A collection of awesome resources related AI security☆185Updated last month
- ☆85Updated last month
- ATLAS tactics, techniques, and case studies data☆57Updated 5 months ago
- Collection of Jupyter Notebooks by @fr0gger_☆158Updated 2 weeks ago
- AI-Powered, Local Pythonic Coding Agent 🐞💻☆23Updated last week
- HoneyAgents is a PoC demo of an AI-driven system that combines honeypots with autonomous AI agents to detect and mitigate cyber threats. …☆42Updated last year
- Automating Security Detection Engineering, published by Packt☆54Updated 5 months ago
- A collection of agents that use Large Language Models (LLMs) to perform tasks common on our day to day jobs in cyber security.☆91Updated 10 months ago
- The project serves as a strategic advisory tool, capitalizing on the ZySec series of AI models to amplify the capabilities of security pr…☆44Updated 9 months ago
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆82Updated 4 months ago
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆51Updated this week
- Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogue…☆54Updated last week
- ☆32Updated 3 months ago
- The Threat Actor Profile Guide for CTI Analysts☆107Updated last year
- Data from Dark Web Marketplace scraping - Be careful☆38Updated 4 months ago
- Merge of two major cyber adversary datasets, MITRE ATT&CK and ETDA/ThaiCERT Threat Actor Cards, enabling victim/motivation-adversary-tech…☆53Updated 2 years ago
- Payloads for Attacking Large Language Models☆75Updated 8 months ago
- This directory features proven systems that demonstrate value to your threat-informed efforts using metrics.☆109Updated 3 months ago
- Creation of a laboratory for malware analysis in AWS☆94Updated 2 years ago
- CALDERA plugin for adversary emulation of AI-enabled systems☆93Updated last year
- TIE is a machine learning model for inferring associated MITRE ATT&CK techniques from previously observed techniques.☆46Updated last week
- AI-powered tool designed to help producing Threat Intelligence Mindmap.☆85Updated 2 months ago
- ☆28Updated 2 weeks ago
- Intelligence around common attacker behaviors (MITRE ATT&CK TTPs), in the form of ATT&CK Navigator "layer" json files.☆34Updated 2 years ago