cybershujin / AI-for-CybersecurityLinks
☆48Updated 8 months ago
Alternatives and similar repositories for AI-for-Cybersecurity
Users that are interested in AI-for-Cybersecurity are comparing it to the libraries listed below
Sorting:
- ☆256Updated 6 months ago
- NOVA: The Prompt Pattern Matching☆144Updated last week
- ☆288Updated last week
- ☆42Updated 7 months ago
- ☆112Updated 2 months ago
- A curated list of LLM driven Cyber security Resources☆33Updated 2 months ago
- Extracts IoCs, TTPs and the relationships between them. Outputs a STIX 2.1 bundle.☆64Updated last week
- Collection of Jupyter Notebooks by @fr0gger_☆173Updated last month
- Code Repository for: AIRTBench: Measuring Autonomous AI Red Teaming Capabilities in Language Models☆68Updated this week
- CALDERA plugin for adversary emulation of AI-enabled systems☆100Updated 2 years ago
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆96Updated last year
- Intel Retrieval Augmented Generation (RAG) Utilities☆90Updated last year
- Save toil in security operations with: Detection & Intelligence Analysis for New Alerts (D.I.A.N.A. )☆187Updated 11 months ago
- Knowledge base on cybercriminal concealment techniques☆75Updated 3 months ago
- A knowledge source about TTPs used to target GenAI-based systems, copilots and agents☆43Updated 2 weeks ago
- Automating Security Detection Engineering, published by Packt☆60Updated 9 months ago
- AI-powered tool designed to help producing Threat Intelligence Mindmap.☆99Updated 2 months ago
- ☆105Updated last year
- ATLAS tactics, techniques, and case studies data☆77Updated 3 months ago
- A collection of companies that disclose adversary TTPs after they have been breached☆244Updated last year
- ☆53Updated 3 months ago
- A starter pack of resources to help you get started in Detection Engineering.☆162Updated last month
- Jupyter Univere is a search engine for all infosec jupyter notebooks☆27Updated 4 months ago
- Delving into the Realm of LLM Security: An Exploration of Offensive and Defensive Tools, Unveiling Their Present Capabilities.☆164Updated last year
- A collection of agents that use Large Language Models (LLMs) to perform tasks common on our day to day jobs in cyber security.☆149Updated last year
- ☆94Updated 2 months ago
- Playbook-NG is a stateless web-based application used to match incident findings with countermeasures for adversary containment and evict…☆103Updated last week
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆90Updated 3 months ago
- Repo for experimenting and testing MCP server builds for CTI-related research.☆27Updated 2 months ago
- ☆60Updated 2 years ago