neo4j-examples / cybersecurity-demoLinks
Neo4j Cybersecurity Demo
☆18Updated 3 years ago
Alternatives and similar repositories for cybersecurity-demo
Users that are interested in cybersecurity-demo are comparing it to the libraries listed below
Sorting:
- Generative AI Governance for Enterprises☆16Updated 5 months ago
- Open Source Tool - Cybersecurity Graph Database in Neo4j☆62Updated last year
- Explore AI Supply Chain Risk with the AI Risk Database☆58Updated last year
- ☁️ 🤖 LLM agent-based simulations to generate benign and malicious Cloud logs☆14Updated 10 months ago
- Security and compliance proxy for LLM APIs☆47Updated last year
- OWASP Ontology-driven Threat Modelling framework☆37Updated last year
- The official Prelude-Correlator GitHub mirror of https://www.prelude-siem.org/projects/prelude-correlator/repository☆10Updated 4 years ago
- A repository containing experimental and upcoming pipelines and features for Morpheus☆28Updated 2 months ago
- A JupyterLab extension to evaluate the security of your Jupyter environment☆39Updated last year
- Security Control Knowledge Graph☆28Updated last year
- ATLAS tactics, techniques, and case studies data☆73Updated last month
- NIST OSCAL SDK and CLI☆19Updated this week
- Security Control Knowledge Graph☆42Updated 2 years ago
- Curated list of awesome software and resources for Senzing, The First Real-Time AI for Entity Resolution.☆58Updated last month
- 🤖 A GitHub action that leverages fabric patterns through an agent-based approach☆27Updated 5 months ago
- ☆8Updated 6 years ago
- GPT-3 use cases for Cybersecurity☆51Updated last year
- Dependency and root cause analysis and more for network and IT management graph example☆27Updated 7 months ago
- This is an opensource project allowing you to compare two LLM's head to head with a given prompt, it has a wide range of supported models…☆23Updated 2 months ago
- Secure Jupyter Notebooks and Experimentation Environment☆75Updated 4 months ago
- StartLeft is an automation tool for generating Threat Models written in the Open Threat Model (OTM) format from a variety of different so…☆50Updated last week
- Mapping Corelight or Zeek data to Elastic Common Schema fields☆34Updated last month
- Elevation of MLsec: a threat-modeling card game for machine learning systems☆22Updated 5 months ago
- ☆10Updated 4 years ago
- Risks and targets for assessing LLMs & LLM vulnerabilities☆30Updated last year
- ☆44Updated last month
- Zero Trust Agent☆24Updated 2 weeks ago
- Import a pcap file into Neo4j and view the network graph. Maintainer: @djent-☆20Updated 3 years ago
- ☆17Updated 6 months ago
- Security Analytics enables users for detecting security threats on their security event log data. It will also allow them to modify/tailo…☆84Updated 3 weeks ago