mrwadams / honeyagentsView external linksLinks
HoneyAgents is a PoC demo of an AI-driven system that combines honeypots with autonomous AI agents to detect and mitigate cyber threats. Features include intelligent threat analysis, automated deny list updates, and detailed natural language threat reports.
☆59Jan 5, 2024Updated 2 years ago
Alternatives and similar repositories for honeyagents
Users that are interested in honeyagents are comparing it to the libraries listed below
Sorting:
- Open-source Fabric templates for cybersecurity and compliance☆31Jan 13, 2025Updated last year
- ☆10Aug 9, 2024Updated last year
- React CodeGen using GPT☆12Feb 11, 2024Updated 2 years ago
- Scripts to help and speed up reversing activities☆13Jan 12, 2026Updated last month
- Article Generation using Microsofts Autogen + OpenAI GPT-4/Any other LLM☆35Dec 5, 2023Updated 2 years ago
- Save toil in security operations with: Detection & Intelligence Analysis for New Alerts (D.I.A.N.A. )☆225Sep 4, 2024Updated last year
- Windows file metadata / forensic tool.☆18Oct 12, 2025Updated 4 months ago
- ☆120May 26, 2025Updated 8 months ago
- List of NSO Pegasus's C2C Servers where will be used to control Pegasus.☆22Nov 2, 2025Updated 3 months ago
- ☆19Jul 10, 2024Updated last year
- ☆21May 20, 2024Updated last year
- ESF modular ingestion tool for development and research.☆37Dec 21, 2021Updated 4 years ago
- A git submodule list containing all the tools repo's you'll ever need.☆27May 22, 2019Updated 6 years ago
- All the principles of the AI modular structure that generates malicious code fragments sold on the dark web☆69Apr 30, 2024Updated last year
- Awesome Splunk SPL hunt queries that can be used to detect the latest vulnerability exploitation attempts & subsequent compromise☆68Apr 29, 2024Updated last year
- Security Content for the PEAK Threat Hunting Framework☆40Feb 15, 2024Updated 2 years ago
- A Streamlit app that transcribes audio using LLMware models, analyzes the text for insights, and includes an interactive Dragon model cha…☆13May 19, 2024Updated last year
- An AI-powered equity research analyst demo using Large Language Models to analyze 10-K filings of renowned NYSE listed companies.☆36Nov 28, 2023Updated 2 years ago
- Create dataset for suricata with indicators of MISP instances and add sightings in MISP if an indicator of dataset generates an alert☆36Nov 9, 2022Updated 3 years ago
- AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE…☆1,207Dec 29, 2025Updated last month
- Lightweight macOS detection agent built on Santa’s Endpoint Security telemetry.☆105Dec 3, 2025Updated 2 months ago
- ☆35Nov 14, 2024Updated last year
- AIL project training materials☆39Jul 17, 2025Updated 6 months ago
- Galah: An LLM-powered web honeypot.☆635Jul 24, 2025Updated 6 months ago
- This repository focuses on the collaborative development of a snake game using the AutoGen framework. Leveraging multiple agents, each wi…☆35Jul 22, 2024Updated last year
- Offline amnesic live Linux distribution☆14Mar 8, 2025Updated 11 months ago
- un sensor pour récupérer les informations des prochaines marées☆12Jan 27, 2026Updated 2 weeks ago
- ☆18Mar 19, 2014Updated 11 years ago
- LawGuru, a state-of-the-art web app, utilizes AI chatbot technology, providing personalized legal assistance to simplify the complexities…☆13Apr 16, 2025Updated 10 months ago
- Microsoft365 Device Code Phishing Framework☆39Sep 4, 2021Updated 4 years ago
- A small binary exploitation challenge to demonstrate a typical return2libc attack☆33Apr 12, 2023Updated 2 years ago
- Stay notified when new ads appear on Leboncoin☆79Dec 24, 2025Updated last month
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆83Apr 27, 2024Updated last year
- Library for extracting fields from Sigtran TCAP/INAP messages☆11Feb 5, 2026Updated last week
- Banking Database Management System for TNB. Java | JavaFX | MySQL☆10May 5, 2023Updated 2 years ago
- Sigma Queries turned into KQL for Defender using pysigma☆12Jun 20, 2024Updated last year
- In this training will be covered about a very basic step for malware analysis. Using several free tools to recognize malware behavior. Si…☆12May 25, 2016Updated 9 years ago
- On-Premises Open Cyber Threat Intelligence Platform☆11Oct 29, 2024Updated last year
- An MCP server that exposes AWS EC2 pricing data with an option to search by CPU, RAM, networking☆20Jul 24, 2025Updated 6 months ago