Morpheus SDK
☆575Jan 29, 2026Updated last month
Alternatives and similar repositories for Morpheus
Users that are interested in Morpheus are comparing it to the libraries listed below
Sorting:
- A repository containing experimental and upcoming pipelines and features for Morpheus☆36Jul 22, 2025Updated 7 months ago
- A collection of RAPIDS examples for security analysts, data scientists, and engineers to quickly get started applying RAPIDS and GPU acce…☆173May 19, 2023Updated 2 years ago
- Rapidly identify and mitigate container security vulnerabilities with generative AI.☆195Feb 5, 2026Updated last month
- A collection of models for organizing, prioritizing, and understanding cybersecurity and information risk management concepts.☆25Oct 3, 2024Updated last year
- This is a dataset intended to train a LLM model for a completely CVE focused input and output.☆66Jun 22, 2025Updated 8 months ago
- A Software as a Service (SaaS) log collection framework.☆183Jan 16, 2026Updated last month
- The Python Risk Identification Tool for generative AI (PyRIT) is an open source framework built to empower security professionals and eng…☆3,500Updated this week
- The NVIDIA NeMo Agent Toolkit UI streamlines interacting with NeMo Agent Toolkit workflows in an easy-to-use web application.☆78Updated this week
- the LLM vulnerability scanner☆7,164Updated this week
- Scan your account for the use of untrusted AMIs☆32Updated this week
- AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE…☆1,206Dec 29, 2025Updated 2 months ago
- An interactive CLI application for interacting with authenticated Jupyter instances.☆55May 7, 2025Updated 10 months ago
- Examples for quickly getting started using Deep Lake! https://activeloop.ai/☆25Sep 4, 2024Updated last year
- Protection against Model Serialization Attacks☆647Feb 18, 2026Updated 2 weeks ago
- Collection of rules created using YARA-Signator over Malpedia☆141Jan 6, 2026Updated 2 months ago
- Kubernetes LDAP authentication service written in Go.☆10May 4, 2019Updated 6 years ago
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Sep 20, 2020Updated 5 years ago
- Provides for deploying custom ETL containers on AIStore, with subsequent user-defined extraction-transformation-loading in parallel, on t…☆19Updated this week
- NVMesh Container Storage Interface (CSI) Driver for Kubernetes☆11Oct 7, 2024Updated last year
- Static analysis for llvm☆20Mar 31, 2015Updated 10 years ago
- Home of https://redteam.guide☆15Sep 19, 2022Updated 3 years ago
- The EMP Jammer is an innovative jamming device which jams the devices nearby by inducing an alternating voltage in it .☆13Jan 3, 2023Updated 3 years ago
- AWS STS token decoder☆46Mar 18, 2025Updated 11 months ago
- ☆56May 5, 2025Updated 10 months ago
- One Conference 2024☆111Oct 1, 2024Updated last year
- Central repo for talks and presentations☆47Jul 23, 2024Updated last year
- OWASP Foundation Web Respository☆355Mar 1, 2026Updated last week
- Enables Zeek to communicate with Tenzir☆11Jul 20, 2023Updated 2 years ago
- Jupyter Kernel for CodeQL☆15Feb 26, 2025Updated last year
- This module detects HTTP requests that are non RFC compliant and used for smuggling☆12Mar 16, 2023Updated 2 years ago
- ☆14Apr 4, 2019Updated 6 years ago
- Simple tool to identify and remediate the use of the AWS EC2 IMDSv1.☆15Aug 12, 2021Updated 4 years ago
- ☆120May 26, 2025Updated 9 months ago
- Appendix resources for Intrinsec's "Amélioration des capacités de détection" handbook.☆13Mar 26, 2018Updated 7 years ago
- LLM prompt attacks for hacker CTFs via CTFd.☆15Dec 17, 2023Updated 2 years ago
- pretrained BERT model for cyber security text, learned CyberSecurity Knowledge☆208Apr 28, 2023Updated 2 years ago
- Infrastructure as code for GPU accelerated managed Kubernetes clusters.☆58Apr 30, 2025Updated 10 months ago
- a CLI that provides a generic automation layer for assessing the security of ML models☆914Jul 18, 2025Updated 7 months ago
- A curated list of large language model tools for cybersecurity research.☆483Apr 10, 2024Updated last year