cybershujin / AI-for-Cybersecurity
☆27Updated this week
Related projects ⓘ
Alternatives and complementary repositories for AI-for-Cybersecurity
- ☆184Updated 3 months ago
- Advisories, guidance, best practice documents and more issued by members of the EU CSIRTs network, a network composed of EU Member States…☆50Updated this week
- ☆98Updated 5 months ago
- AI-powered tool designed to help producing Threat Intelligence Mindmap.☆74Updated last month
- Intel Retrieval Augmented Generation (RAG) Utilities☆87Updated 9 months ago
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆74Updated 10 months ago
- A collection of reports and case studies to understand the threat landscape for UK critical infrastructure☆38Updated 9 months ago
- Collection of Jupyter Notebooks by @fr0gger_☆142Updated 2 months ago
- ☆69Updated this week
- ☆82Updated 2 months ago
- Collection of videos of Raids on Cybercriminals☆17Updated last month
- Cyber Underground General Intelligence Requirements☆90Updated 9 months ago
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.☆50Updated 2 weeks ago
- A collection of agents that use Large Language Models (LLMs) to perform tasks common on our day to day jobs in cyber security.☆55Updated 6 months ago
- Intelligence Architecture Mind Map☆117Updated 7 months ago
- DriveFS Sleuth is a Python tool that automates investigating Google Drive File Stream disk artifacts, the tool has been developed based o…☆73Updated 3 weeks ago
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆37Updated last year
- A collection of CVEs weaponized by ransomware operators☆51Updated this week
- The project serves as a strategic advisory tool, capitalizing on the ZySec series of AI models to amplify the capabilities of security pr…☆39Updated 5 months ago
- Sensor Mappings to ATT&CK is a collection of resources to assist cyber defenders with understanding which sensors and events can help det…☆45Updated 5 months ago
- The Threat Actor Profile Guide for CTI Analysts☆96Updated last year
- List of links and resources referred to in my SANS OSINT Summit 2023 Talk: "Tips & Tricks For Digital Dumpster Diving"☆40Updated last year
- Automating Security Detection Engineering, published by Packt☆47Updated 3 weeks ago
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆23Updated 2 months ago
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆61Updated this week
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆17Updated last year
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆44Updated 2 weeks ago
- Merge of two major cyber adversary datasets, MITRE ATT&CK and ETDA/ThaiCERT Threat Actor Cards, enabling victim/motivation-adversary-tech…☆50Updated 2 years ago
- ATT&CK Powered Suit is a browser extension that puts the complete MITRE ATT&CK® knowledge base at your fingertips with text search, conte…☆72Updated this week