Build AI-powered security tools. 50+ hands-on labs covering ML, LLMs, RAG, threat detection, DFIR, and red teaming. Includes Colab notebooks, Docker environment, and CTF challenges.
☆132Apr 20, 2026Updated last week
Alternatives and similar repositories for ai_for_the_win
Users that are interested in ai_for_the_win are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Docker lab integrating Splunk SIEM with Ollama LLM via MCP for AI security operations. Features Promptfoo OWASP evaluation, TA-ollama a…☆29Mar 8, 2026Updated last month
- Static Decryptor for IcedID Malware☆18Oct 1, 2022Updated 3 years ago
- Malware detonation platform Polygon integration☆10Aug 1, 2023Updated 2 years ago
- A tool for fetching DFIR and other GitHub tools.☆27Aug 2, 2025Updated 8 months ago
- Security tools for purple team, AI security, and M365/GWS. Authorized use only.☆135Apr 20, 2026Updated last week
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Port Invaders is an arcade-style educational game designed to help you learn and memorize common networking port numbers. Whether you're …☆19Sep 4, 2023Updated 2 years ago
- A python script for smart lightbulbs to show how badly you're losing money☆38Apr 28, 2025Updated last year
- Make your smart speaker; smart.☆18Apr 3, 2023Updated 3 years ago
- CSIRT Jump Bag☆27Apr 25, 2024Updated 2 years ago
- The official repository of PowersheLLM, a model for Powershell maliciousness detection using fine-tuned LLM☆14Jun 6, 2024Updated last year
- Certified Kubernetes Associate (CKA) exam notes☆12Mar 1, 2025Updated last year
- Research into Undocumented Behavior of Azure AD Refresh Tokens☆13Oct 27, 2023Updated 2 years ago
- A list of sources for OSINT in Uzbekistan☆23Jan 17, 2025Updated last year
- Regex based secret scanner for sccm deployment points sccmcontentlib$ shares. Find secrets automatically and download entire packages for…☆18Aug 13, 2025Updated 8 months ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Deep Packet Inspection • Traffic Forensics • Network Threat Detection☆53Feb 20, 2026Updated 2 months ago
- 非涉密源码☆19Mar 13, 2024Updated 2 years ago
- Digital forensics for Google Drive—done right. Identify, preserve, and document cloud evidence with hash verification, timeline reconstru…☆26Dec 8, 2025Updated 4 months ago
- Creating attacks paths across management and data planes☆50Updated this week
- YARA, SIGMA, SNORT Rules based on Malware Analysis☆17Apr 23, 2025Updated last year
- AISecLists - Your AI Red Teaming Arsenal. Discover a curated collection of prompt lists for diverse AI security assessments, including LL…☆14Jan 18, 2025Updated last year
- ☆30Apr 18, 2026Updated last week
- Rigorously evaluating autonomous systems for cybersecurity at scale☆30Jul 9, 2025Updated 9 months ago
- SRE - Dissecting Malware for Static Analysis & the Complete Command-line Tool☆58Dec 29, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Automatic/Custom Destinations & LNK (MS-SHLLINK) Browser☆47Apr 4, 2026Updated 3 weeks ago
- Bloodhound Portable for Windows☆54Apr 1, 2023Updated 3 years ago
- Venture: Cross-Platform GUI tool for parsing and analyzing Windows event logs☆95Jan 23, 2025Updated last year
- Security automation with n8n ideas: 100+ Red/Blue/AppSec workflows, integrations, and ready-to-run playbooks.☆639Sep 20, 2025Updated 7 months ago
- A collection of Script for Red Team & Incidence Response☆11Jun 30, 2022Updated 3 years ago
- Assist analyst and threat hunters to understand Windows authentication logs and to analyze brutforce scenarios.☆21Jul 1, 2023Updated 2 years ago
- ☆23Sep 7, 2023Updated 2 years ago
- A framework and taxonomy for identifying, classifying, and reasoning about detection logic bugs in SIEM, EDR, and XDR rules, with concret…☆48Mar 5, 2026Updated last month
- MCP to help Defenders Detection Engineer Harder and Smarter☆420Apr 21, 2026Updated last week
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Conversion of Okta System Log to OCSF project template☆14Aug 17, 2023Updated 2 years ago
- Normalizer for honeypot data.☆11Dec 6, 2023Updated 2 years ago
- Python script that generates a HTML triage report of iOS notifications content.☆17Sep 19, 2019Updated 6 years ago
- Automated Cloud Misconfiguration Testing☆25Jun 20, 2025Updated 10 months ago
- Just another Process Injection using Process Hollowing technique.☆18Sep 18, 2023Updated 2 years ago
- AWS Community Builders - content catalog☆20Aug 27, 2023Updated 2 years ago
- Production-grade MCP server giving Claude 27 security intelligence tools across 21 APIs — CVE lookup, EPSS scoring, CISA KEV, MITRE ATT&C…☆263Apr 14, 2026Updated 2 weeks ago