santosomar / RAG-for-cybersecurity
This repository contains resources and materials for the "Using Retrieval Augmented Generation (RAG), Langchain, and LLMs for Cybersecurity Operations" and other courses by Omar Santos.
☆28Updated last week
Alternatives and similar repositories for RAG-for-cybersecurity:
Users that are interested in RAG-for-cybersecurity are comparing it to the libraries listed below
- HoneyAgents is a PoC demo of an AI-driven system that combines honeypots with autonomous AI agents to detect and mitigate cyber threats. …☆41Updated last year
- 🤖 A GitHub action that leverages fabric patterns through an agent-based approach☆15Updated last month
- CybGPT is at the forefront of integrating OpenAI's advanced GPT technology with the complex landscape of cybersecurity.☆39Updated 8 months ago
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆34Updated this week
- A collection of dashboards, templates, API's and Power BI code for vulnerability management and analysis☆15Updated 2 weeks ago
- ☆27Updated 2 months ago
- AI-powered tool designed to help security professionals detect vulnerabilities at machine speed and extract insights from extensive bug b…☆13Updated 5 months ago
- Agentic Workflows Made Simple☆101Updated last week
- The project serves as a strategic advisory tool, capitalizing on the ZySec series of AI models to amplify the capabilities of security pr…☆43Updated 8 months ago
- ☆25Updated 2 months ago
- source code for the offsecml framework☆37Updated 8 months ago
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆66Updated 7 months ago
- ☆36Updated 2 months ago
- An AI-powered tool for discovering privilege escalation opportunities in AWS IAM configurations.☆106Updated 4 months ago
- Security Control Knowledge Graph☆27Updated 9 months ago
- Secure Jupyter Notebooks and Experimentation Environment☆64Updated last week
- ☆62Updated 2 months ago
- ATLAS tactics, techniques, and case studies data☆55Updated 4 months ago
- Application which investigates defensive measures against prompt injection attacks on an LLM, with a focus on the exposure of external to…☆21Updated 3 months ago
- ☆15Updated 2 months ago
- AI-Powered, Local Pythonic Coding Agent 🐞💻☆22Updated 3 weeks ago
- LLM Testing Findings Templates☆66Updated last year
- Class tools for overview of MITRE ATT&CK®☆35Updated 6 months ago
- Awesome products for securing AI systems includes open source and commercial options and an infographic licensed CC-BY-SA-4.0.☆57Updated 8 months ago
- Code repository for "Machine Learning For Red Team Hackers".☆32Updated 5 years ago
- Delving into the Realm of LLM Security: An Exploration of Offensive and Defensive Tools, Unveiling Their Present Capabilities.☆158Updated last year
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆37Updated 5 months ago
- Public repository of all things cloud security.☆40Updated 4 months ago
- ☆34Updated 2 months ago
- ☆11Updated last year