Rigorously evaluating autonomous systems for cybersecurity at scale
☆30Jul 9, 2025Updated 8 months ago
Alternatives and similar repositories for DefenderBench
Users that are interested in DefenderBench are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Automated Cloud Misconfiguration Testing☆23Jun 20, 2025Updated 9 months ago
- The Trend Vision One Model Context Protocol (MCP) Server enables natural language interaction between your favourite AI tooling and the T…☆28Feb 20, 2026Updated last month
- We want to create a Python PLC honeypot which support multiple primary OT communication protocols such as Modbus-TCP and Siemens-S7Comm. …☆58Apr 30, 2025Updated 11 months ago
- R interface to the Censys "cyber"/scans search engine • https://www.censys.io/tutorial☆14Aug 9, 2022Updated 3 years ago
- A web API for various cyber threat intelligence frameworks, including MITRE ATT&CK, CWE, ATLAS...☆19Updated this week
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- My Notes from Hugging Face AI Agents Course☆20Feb 18, 2025Updated last year
- AISecLists - Your AI Red Teaming Arsenal. Discover a curated collection of prompt lists for diverse AI security assessments, including LL…☆13Jan 18, 2025Updated last year
- A project designed to make the operationalization of open-source cyber threat intelligence more efficient.☆17Updated this week
- Home repo for documentation and links to resources☆12Jul 25, 2019Updated 6 years ago
- Research on Complaints in Social Media (ACL 2019)☆15Aug 15, 2019Updated 6 years ago
- This Repo clone and organize all nuclei templates that are found in Github. { due to git runner time limit stopped the workflow, ping me …☆13Feb 28, 2025Updated last year
- TrendAI Vision One Open Source Community Projects☆24Updated this week
- A lightweight Python HTTP server with fuzzy filename matching and automatic fallback to directory listing.☆13Aug 28, 2025Updated 7 months ago
- Code and data accompanying paper "Twitter Homophily: Network Based Prediction of User’s Occupation"☆19Jul 23, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A basic Android background service that connects to a remote server, executes commands, and returns encrypted output. Disguised as a syst…☆21Aug 2, 2025Updated 7 months ago
- Misc IDA Pro scripts☆23Oct 17, 2016Updated 9 years ago
- A collection of skills, agents, commands, and workflows for security researchers. Compatible with Claude Code, Claude Desktop, OpenCode, …☆33Feb 25, 2026Updated last month
- a tool for analysing and reversing x64 at&t disassembly☆12Dec 30, 2021Updated 4 years ago
- ☆24Jan 15, 2026Updated 2 months ago
- Extract machine readable cyber threat intelligence from unstructured data (inc. PDFs, Word docs, and HTML pages)☆35Updated this week
- Python library to add support for embedding natural code in Python with shared program state.☆24Jan 20, 2026Updated 2 months ago
- findLoop - find possible encryption/decryption or compression/decompression code☆28Mar 30, 2019Updated 7 years ago
- Darkweb_Crawler - is an advanced, stealthy Python-based dark web intelligence platform designed for authorized security professionals and…☆122Feb 18, 2026Updated last month
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Cleanup of older MISP events can require some work until now☆28Sep 13, 2025Updated 6 months ago
- ☆13Nov 10, 2020Updated 5 years ago
- Welcome to the hands-on resource hub for the Generative AI Development Environments Bootcamp. This repo is designed to help you explore d…☆26Oct 22, 2025Updated 5 months ago
- Reverse-engineer a Dockerfile from a Docker image.☆15Nov 7, 2023Updated 2 years ago
- MPC Server for PySpark inpired by the LakeSail☆17Feb 26, 2026Updated last month
- Simulated large clusters for Kubernetes scheduler validation.☆15Jan 3, 2023Updated 3 years ago
- A Model Context Protocol (MCP) server that integrates Volatility 3 memory forensics framework with Claude☆34Jul 7, 2025Updated 8 months ago
- Ecommerce app created using Paper☆18Mar 12, 2025Updated last year
- HashRipper is a powerful and fast multi-threaded ethical hacking tool written in Python for cracking hashes. It supports over 17+ popular…☆22Nov 19, 2025Updated 4 months ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Multilayered secret detection tool☆41Feb 11, 2026Updated last month
- PyTorch implementation of Graph Attention Networks☆21Sep 10, 2019Updated 6 years ago
- FMI for Power System☆10Sep 6, 2019Updated 6 years ago
- The best effort controller☆14Dec 9, 2018Updated 7 years ago
- A massive multiplayer online take on the arcade classic, written as a part of Clojure Cup 2013☆50May 21, 2014Updated 11 years ago
- A cloud platform for deploying and hosting websites with API integration, build automation, and reverse proxy setup.☆17Dec 26, 2024Updated last year
- 漏洞规则库是一个致力于帮助开发者识别和避免常见安全漏洞的开源项目。我们收集、整理和分析各类编程语言和常用库中的安全漏洞模式,并提供相应的防范措施和最佳实践。☆40Aug 12, 2025Updated 7 months ago