santosomar / RAG-for-cybersecurity
This repository contains resources and materials for the "Using Retrieval Augmented Generation (RAG), Langchain, and LLMs for Cybersecurity Operations" and other courses by Omar Santos.
☆14Updated 3 weeks ago
Related projects ⓘ
Alternatives and complementary repositories for RAG-for-cybersecurity
- Secure Jupyter Notebooks and Experimentation Environment☆55Updated 3 weeks ago
- A collection of dashboards, templates, API's and Power BI code for vulnerability management and analysis☆13Updated this week
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆23Updated 2 months ago
- Defending IaaS with ATT&CK is a project to create a collection of ATT&CK techniques relevant to a Linux IaaS environment, as well as a me…☆13Updated 8 months ago
- using ML models for red teaming☆39Updated last year
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆62Updated 4 months ago
- A collection of agents that use Large Language Models (LLMs) to perform tasks common on our day to day jobs in cyber security.☆56Updated 6 months ago
- ☆15Updated 2 years ago
- CybGPT is at the forefront of integrating OpenAI's advanced GPT technology with the complex landscape of cybersecurity.☆36Updated 5 months ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆27Updated 2 years ago
- HoneyAgents is a PoC demo of an AI-driven system that combines honeypots with autonomous AI agents to detect and mitigate cyber threats. …☆38Updated 10 months ago
- Tool for obfuscating and deobfuscating data.☆63Updated 7 months ago
- ATLAS tactics, techniques, and case studies data☆49Updated last month
- ☆22Updated last week
- ☆20Updated last month
- This repository contains generated contextual data utilized by pyattck.☆17Updated 3 months ago
- Determine privileges from cloud credentials via brute-force testing.☆64Updated 2 months ago
- An AI-powered tool for discovering privilege escalation opportunities in AWS IAM configurations.☆96Updated last month
- ☆98Updated 5 months ago
- A set of AWS resources for testing the Log4Shell vulnerability, deployable with terraform☆12Updated 2 years ago
- A walkthrough of security controls for a serverless architecture via a demo application☆11Updated 2 years ago
- A productionized greedy coordinate gradient (GCG) attack tool for large language models (LLMs)☆38Updated this week
- ☆11Updated last year
- A self assessment tool to help understand your level in the SANS Vulnerability Management Maturity Model (VMMM).☆19Updated last year
- ☆69Updated this week
- ☆18Updated 2 years ago
- ☆14Updated this week
- Autoconfigured ELK Stack That Contains All EPSS and NVD CVE Data☆46Updated 4 months ago
- A small security playground implementation of GHOSTS User Simulation framework with an Active Directory deployment and Elastic.☆13Updated 3 months ago
- Vulnerable by Design AWS Cloud Development Kit (CDK) Infrastructure☆43Updated 10 months ago