google / sec-geminiLinks
Sec-Gemini v1 is a cutting-edge AI model designed to enhance cybersecurity capabilities and empower defenders in the ongoing battle against cyber threats.
☆55Updated 2 weeks ago
Alternatives and similar repositories for sec-gemini
Users that are interested in sec-gemini are comparing it to the libraries listed below
Sorting:
- Helm charts for running open source digital forensic tools in Kubernetes☆114Updated last week
- This is a repository to experiment with MCP for security☆42Updated 7 months ago
- IOCs from Google Threat Intelligence☆33Updated 2 months ago
- ☆74Updated 5 months ago
- 🤖 A GitHub action that leverages fabric patterns through an agent-based approach☆32Updated 7 months ago
- Global Security Database Tools☆43Updated last year
- ☆47Updated 5 months ago
- Modular framework for file information extraction and dependency analysis to generate accurate SBOMs☆33Updated this week
- CVE.ICU code.☆46Updated this week
- An OpenAI API Compatible Honeypot Gateway☆16Updated 5 months ago
- A Golang library for interacting with the EPSS (Exploit Prediction Scoring System).☆29Updated 6 months ago
- ☆333Updated this week
- ☆146Updated 2 months ago
- Repository of tools and resources for analyzing Docker containers☆67Updated last year
- Focused malicious code detection ruleset, with a high protection-to-noise ratio☆123Updated 6 months ago
- Threat Intel Platform for T-POTs☆161Updated last week
- ☆15Updated last year
- ☆120Updated 3 months ago
- Documentation of Semgrep: a fast, open-source, static analysis tool.☆42Updated this week
- Automation tool for Windows Deception Host Burn-In☆86Updated 8 months ago
- EPSS(Exploit Prediction Scoring System) API client☆19Updated this week
- CALDERA plugin for adversary emulation of AI-enabled systems☆100Updated 2 years ago
- Secure Jupyter Notebooks and Experimentation Environment☆79Updated 6 months ago
- ☆94Updated 2 weeks ago
- Post-Quantum Cryptography Scanner - Scan SSH/TLS servers for PQC support☆84Updated 3 weeks ago
- NOVA: The Prompt Pattern Matching☆161Updated 3 weeks ago
- Adversary Emulation Planner☆41Updated last year
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆71Updated last year
- Analyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public service - https…☆126Updated last year
- Your Swiss Army knife to analyze malicious web traffic based on mitmproxy.☆58Updated last week