Morpheus SDK
☆583Jan 29, 2026Updated 2 months ago
Alternatives and similar repositories for Morpheus
Users that are interested in Morpheus are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A repository containing experimental and upcoming pipelines and features for Morpheus☆36Jul 22, 2025Updated 8 months ago
- Rapidly identify and mitigate container security vulnerabilities with generative AI.☆197Feb 5, 2026Updated last month
- The NVIDIA NeMo Agent Toolkit UI streamlines interacting with NeMo Agent Toolkit workflows in an easy-to-use web application.☆88Mar 21, 2026Updated last week
- A collection of models for organizing, prioritizing, and understanding cybersecurity and information risk management concepts.☆26Oct 3, 2024Updated last year
- ☆195Updated this week
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A Software as a Service (SaaS) log collection framework.☆185Mar 16, 2026Updated last week
- The NVIDIA NeMo Agent toolkit is an open-source library for efficiently connecting and optimizing teams of AI agents.☆2,101Updated this week
- Zeek scripts that provide an alternative log file logging TLS/SSL traffic☆12May 4, 2021Updated 4 years ago
- the LLM vulnerability scanner☆7,391Updated this week
- Repository for accompanying materials to Threat Knowledge Graphs.☆18Jul 16, 2025Updated 8 months ago
- The EMP Jammer is an innovative jamming device which jams the devices nearby by inducing an alternating voltage in it .☆13Jan 3, 2023Updated 3 years ago
- The Python Risk Identification Tool for generative AI (PyRIT) is an open source framework built to empower security professionals and eng…☆3,593Mar 22, 2026Updated last week
- Run cloud native workloads on NVIDIA GPUs☆231Jan 22, 2026Updated 2 months ago
- AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE…☆1,212Dec 29, 2025Updated 3 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- AWS STS token decoder☆47Mar 18, 2025Updated last year
- A tool that checks if a TorchServe instance is vulnerable to CVE-2023-43654☆39Apr 21, 2024Updated last year
- Code for our submission to the WTMC 2021 workshop☆14Jul 14, 2021Updated 4 years ago
- A collection of example for learning how to use Golang.☆14May 4, 2019Updated 6 years ago
- Starting Point for the CSAW HackML 2020 competition is here: https://www.csaw.io/hackml☆10Dec 5, 2021Updated 4 years ago
- Indicators of Normality☆11Jul 22, 2022Updated 3 years ago
- ☆35Mar 13, 2026Updated 2 weeks ago
- Python client for the Open eXecution Protocol (OXP)☆17May 16, 2025Updated 10 months ago
- This is a five-step framework for the development of intrusion detection systems (IDS) using machine learning (ML) considering model real…☆59Dec 30, 2025Updated 2 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- TRITONCACHE implementation of a Redis cache☆17Mar 13, 2026Updated 2 weeks ago
- Context-Aware RAG library for Knowledge Graph ingestion and retrieval functions.☆62Mar 18, 2026Updated last week
- Collection of rules created using YARA-Signator over Malpedia☆143Jan 6, 2026Updated 2 months ago
- Public datasets to help you address various cyber security problems.☆472Mar 28, 2022Updated 4 years ago
- A curated list of MLSecOps tools, articles and other resources on security applied to Machine Learning and MLOps systems.☆427Aug 1, 2025Updated 7 months ago
- Spins up a docker container with several useful tools for offensive security in macOS/cloud environments. Also installs the needed depend…☆18Nov 3, 2021Updated 4 years ago
- A GUI-based tool to perform security testing against the HDMI CEC (Consumer Electronics Control) and HEC (HDMI Ethernet Channel) protocol…☆31Nov 6, 2013Updated 12 years ago
- php7.4.26-internalog☆13Oct 13, 2022Updated 3 years ago
- ☆56May 5, 2025Updated 10 months ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Development of Botnet Detection Module for Traffic-Based IoT Devices Using Deep Learning☆14Dec 26, 2022Updated 3 years ago
- A curated list of large language model tools for cybersecurity research.☆484Apr 10, 2024Updated last year
- ☆15Apr 4, 2019Updated 6 years ago
- ☆19Aug 2, 2020Updated 5 years ago
- Lightweight macOS detection agent built on Santa’s Endpoint Security telemetry.☆109Dec 3, 2025Updated 3 months ago
- Modular web-application honeypot platform built using go and gin☆63May 8, 2024Updated last year
- a CLI that provides a generic automation layer for assessing the security of ML models☆916Jul 18, 2025Updated 8 months ago