Generative AI-based CyberSecurity-focused Prompt Dataset for Benchmarking Large Language Models
☆32Jan 14, 2025Updated last year
Alternatives and similar repositories for dataset
Users that are interested in dataset are comparing it to the libraries listed below
Sorting:
- CDS Threat Modeling Tool MVP☆14Updated this week
- A thin async wrapper for SQLAlchemy sessions☆10Sep 13, 2021Updated 4 years ago
- System Validation Platform☆12Sep 18, 2025Updated 5 months ago
- ☆12Feb 10, 2026Updated 2 weeks ago
- A curated list of 150+ papers and resources on Agentic Security. Based on the survey covering the transition from passive LLMs to autonom…☆28Dec 6, 2025Updated 2 months ago
- ☆17Feb 3, 2026Updated 3 weeks ago
- AI featured threat modeling and security review action☆46Nov 17, 2024Updated last year
- 📻 A Mand Mobile project example for Nuxt☆11Jan 4, 2023Updated 3 years ago
- MultiStep MCP That Returns CVE Information With EPSS Score☆13May 22, 2025Updated 9 months ago
- ☆12Mar 18, 2024Updated last year
- ☆14Jan 10, 2021Updated 5 years ago
- A powerful Burp Suite extension that automatically detects JavaScript URLs from HTTP traffic, scans them using TruffleHog for secrets det…☆31Oct 23, 2025Updated 4 months ago
- ☆11Oct 27, 2020Updated 5 years ago
- ☆14Feb 16, 2023Updated 3 years ago
- GUI and command line application for downloading large data volumes from PI Historian☆11Nov 8, 2023Updated 2 years ago
- Python interpreter for SEL (Schweitzer Engineering Laboratories) CEV (Compressed EVent record) files.☆13Jan 16, 2023Updated 3 years ago
- GitHub action to generate a CycloneDX SBOM for .NET☆12Jul 15, 2025Updated 7 months ago
- AI Resilience Maturity Model☆25Aug 4, 2024Updated last year
- code for "Decoupled Preference-based Reinforcement Learning for Personalized Human-Robot Interaction"☆11Jul 9, 2022Updated 3 years ago
- minimal program to monitor and print cpu usage of a container☆12May 19, 2020Updated 5 years ago
- Framwork for the work "Large Language Models for Zero Touch Network Configuration Management"☆12Jun 20, 2024Updated last year
- @DisCo is a graph based datastore designed to minimize reverse engineering efforts.☆12Jan 21, 2021Updated 5 years ago
- Draw.io Model Context Protocol (MCP) Browser Extension☆20Updated this week
- GitHub Actions Security Tester☆12Feb 1, 2023Updated 3 years ago
- IEC104 Client for Metasploit☆11Aug 6, 2018Updated 7 years ago
- Bro analyzer that detects Google's QUIC protocol☆10Mar 2, 2021Updated 4 years ago
- ☆12Nov 27, 2024Updated last year
- Scripts developed to help in mobile forensics investigations☆10Jul 4, 2017Updated 8 years ago
- Wireshark dissector for wirelessHART☆13Aug 2, 2017Updated 8 years ago
- Energy-Efficient Routing Based on Reinforcement Learning☆13Jun 1, 2022Updated 3 years ago
- A collection of permissively licensed Semgrep rules.☆22Jul 5, 2024Updated last year
- SVP library that enables communication with energy lab equipment.☆13Sep 18, 2025Updated 5 months ago
- Subdomain finder☆10Mar 13, 2025Updated 11 months ago
- ☆15Jun 12, 2023Updated 2 years ago
- Simple packet dissector that detects anomalous DNP3 traffic by analysing its parameters☆15Jan 12, 2016Updated 10 years ago
- 使用 Python 和 Pygame 开发《星露谷物语》 游戏☆13Sep 4, 2022Updated 3 years ago
- Cloud security documents and tools to assist with conducting risk assessments that conform to the ICS62443 guidelines☆11Apr 24, 2023Updated 2 years ago
- Official implementation of "Poisoning Attacks on Cyber Attack Detectors for Industrial Control Systems" by Moshe Kravchik, Battista Biggi…☆14Mar 22, 2021Updated 4 years ago
- A network analysis tool that works together with snort to visually represent a PROFINET network graph.☆16May 17, 2016Updated 9 years ago