saadullah01 / cve-genie-promptsLinks
This repository shows the prompts we used for each agent in CVE-Genie
☆23Updated 4 months ago
Alternatives and similar repositories for cve-genie-prompts
Users that are interested in cve-genie-prompts are comparing it to the libraries listed below
Sorting:
- Collect chrome extensions from various devices and find out if they are malicious☆24Updated last month
- Static code search python lib☆18Updated 4 years ago
- Tools related to work with Attack Flow (https://github.com/center-for-threat-informed-defense/attack-flow)☆44Updated 3 years ago
- Salesforce Policy Deviation Checker☆30Updated 5 years ago
- ☆123Updated last month
- ☆67Updated 2 months ago
- Collection of Semgrep rules for security analysis☆10Updated last year
- A packer utility to create and capture DFIR Image for use AWS & Azure☆15Updated 5 years ago
- Updated incident response generator for training classes☆44Updated 4 years ago
- Web based analysis platform for use with the AWS_IR command line tool.☆17Updated 9 years ago
- Static Token And Credential Scanner☆95Updated 2 years ago
- ☆30Updated 4 years ago
- Use Markov Chains to obfuscate data as other data☆54Updated 9 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆14Updated 3 years ago
- Presentations, training modules, and other education materials from Duo Security's Application Security team.☆77Updated 4 years ago
- ☆41Updated 7 months ago
- CVE.ICU code.☆46Updated this week
- Semgrep rules corresponding to the OWASP ASVS standard☆27Updated 4 years ago
- I read 20 years of mostly-fail at cyber norms at the UN, and now you can too!☆21Updated 7 years ago
- Overview about existing tools that can be useful for AWS auditing purposes.☆15Updated 8 years ago
- ☆23Updated last year
- Autoconfigured ELK Stack That Contains All EPSS and NVD CVE Data☆52Updated 3 months ago
- Elasticsearch/Kibana environment and log data for Sigma workshop☆27Updated 5 years ago
- A curated threat modeling library collection☆22Updated last year
- Proof of concept implementation of fuzzing workload using AFL as the fuzzer and Terraform to codify infrastructure☆31Updated 6 years ago
- Check IOC provided by a MISP instance on Suricata events☆18Updated 6 years ago
- A dataset of software supply chain compromises. Please help us maintain it!☆130Updated 3 years ago
- CyCAT.org taxonomies☆15Updated 4 years ago
- Public release of Whalehoney Honeypot☆29Updated 3 years ago
- threat-intelligence.eu website and repository of information about open standards, documents, methodologies and processes in threat intel…☆49Updated last month