santosomar / RAG-for-cybersecurity
This repository contains resources and materials for the "Using Retrieval Augmented Generation (RAG), Langchain, and LLMs for Cybersecurity Operations" and other courses by Omar Santos.
β51Updated last month
Alternatives and similar repositories for RAG-for-cybersecurity
Users that are interested in RAG-for-cybersecurity are comparing it to the libraries listed below
Sorting:
- π€ A GitHub action that leverages fabric patterns through an agent-based approachβ26Updated 4 months ago
- Rapidly identify and mitigate container security vulnerabilities with generative AI.β120Updated 3 weeks ago
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projectsβ76Updated last week
- Top 10 for Agentic AI (AI Agent Security)β99Updated 2 months ago
- Cybersecurity Intelligent Pentesting Helper for Ethical Researcher (CIPHER). Fine tuned LLM for penetration testing guidance based on wriβ¦β22Updated 4 months ago
- β39Updated last week
- CybGPT is at the forefront of integrating OpenAI's advanced GPT technology with the complex landscape of cybersecurity.β41Updated 11 months ago
- A collection of agents that use Large Language Models (LLMs) to perform tasks common on our day to day jobs in cyber security.β111Updated last year
- β36Updated 4 months ago
- The project serves as a strategic advisory tool, capitalizing on the ZySec series of AI models to amplify the capabilities of security prβ¦β48Updated 11 months ago
- HoneyAgents is a PoC demo of an AI-driven system that combines honeypots with autonomous AI agents to detect and mitigate cyber threats. β¦β47Updated last year
- β26Updated 5 months ago
- Vulnerability impact analyzer that reduces false positives in SCA tools by performing intelligent code analysis. Uses agentic AI with opeβ¦β54Updated 2 months ago
- ATLAS tactics, techniques, and case studies dataβ71Updated 3 weeks ago
- β42Updated 3 months ago
- β39Updated 5 months ago
- an extension for Burp Suite to allow researchers to utilize GPT for analys is of HTTP requests and responsesβ109Updated 2 years ago
- An example vulnerable app that integrates an LLMβ20Updated last year
- A collection of prompt injection mitigation techniques.β22Updated last year
- β40Updated last week
- β73Updated 2 weeks ago
- A LLM explicitly designed for getting hackedβ149Updated last year
- LLM Testing Findings Templatesβ72Updated last year
- AIGoat: A deliberately Vulnerable AI Infrastructure. Learn AI security through solving our challenges.β234Updated 3 weeks ago
- AI-powered tool designed to help security professionals detect vulnerabilities at machine speed and extract insights from extensive bug bβ¦β16Updated 8 months ago
- Secure Jupyter Notebooks and Experimentation Environmentβ74Updated 3 months ago
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.β53Updated 2 months ago
- Welcome to MitreMesh. Where MITRE's framework meets dynamic scenario generation, creating a comprehensive net of incident response tests β¦β16Updated last year
- Payloads for Attacking Large Language Modelsβ83Updated 10 months ago
- Adversarial AI - Attacks, Mitigations, and Defense Strategies, published by Packtβ37Updated 9 months ago