nv-morpheus / morpheus-experimental
A repository containing experimental and upcoming pipelines and features for Morpheus
☆28Updated 2 months ago
Alternatives and similar repositories for morpheus-experimental
Users that are interested in morpheus-experimental are comparing it to the libraries listed below
Sorting:
- ATLAS tactics, techniques, and case studies data☆71Updated 3 weeks ago
- Generative AI Governance for Enterprises☆16Updated 4 months ago
- Secure Jupyter Notebooks and Experimentation Environment☆74Updated 3 months ago
- ☆39Updated last week
- 🤖 A GitHub action that leverages fabric patterns through an agent-based approach☆26Updated 4 months ago
- Explore AI Supply Chain Risk with the AI Risk Database☆56Updated last year
- This project will work towards a fully-functional autonomous intelligent cyberdefense agent with increasingly advanced capabilities that …☆29Updated 3 months ago
- An extended version of SecureBERT, trained on top of both base and large version of RoBERTa using 10 GB cybersecurity-related data☆24Updated last year
- HoneyAgents is a PoC demo of an AI-driven system that combines honeypots with autonomous AI agents to detect and mitigate cyber threats. …☆47Updated last year
- SMET : Semantic Mapping of CVE to ATT&CK and its Application to Cybersecurity☆46Updated 8 months ago
- Open Source Tool - Cybersecurity Graph Database in Neo4j☆62Updated last year
- This repository hosts community contributed Kestrel analytics☆17Updated 11 months ago
- ☆21Updated last month
- SecureBERT is a domain-specific language model to represent cybersecurity textual data.☆89Updated 9 months ago
- Zero Trust Agent☆20Updated 2 weeks ago
- Rapidly identify and mitigate container security vulnerabilities with generative AI.☆120Updated 3 weeks ago
- Machine learning on knowledge graphs for context-aware security monitoring (data and model)☆18Updated 3 years ago
- Neo4j Cybersecurity Demo☆18Updated 3 years ago
- "Linking Threat Tactics, Techniques, and Patterns with Defensive Weaknesses, Vulnerabilities and Affected Platform Configurations for Cyb…☆93Updated 10 months ago
- Practical examples of "Flawed Machine Learning Security" together with ML Security best practice across the end to end stages of the mach…☆109Updated 2 years ago
- GPT-3 use cases for Cybersecurity☆52Updated last year
- The project serves as a strategic advisory tool, capitalizing on the ZySec series of AI models to amplify the capabilities of security pr…☆48Updated 11 months ago
- A collection of agents that use Large Language Models (LLMs) to perform tasks common on our day to day jobs in cyber security.☆111Updated last year
- A framework for the Analysis of Intrusion Detection Alerts☆17Updated 3 years ago
- AI-enabled Cybersecurity for Future Smart Environments☆24Updated 9 months ago
- OASIS Cyber Threat Intelligence (CTI) TC: A tool for generating STIX content for prototyping and testing. https://github.com/oasis-open/c…☆41Updated last year
- Security and compliance proxy for LLM APIs☆47Updated last year
- STIX 2.1 Visualizer, Attack and Activity Thread Graph for Threat Modeling☆32Updated 5 months ago
- Posture Attribute Collection and Evaluation☆23Updated last year
- ☆104Updated 11 months ago