santosomar / RAG-for-cybersecurity
This repository contains resources and materials for the "Using Retrieval Augmented Generation (RAG), Langchain, and LLMs for Cybersecurity Operations" and other courses by Omar Santos.
☆23Updated last week
Alternatives and similar repositories for RAG-for-cybersecurity:
Users that are interested in RAG-for-cybersecurity are comparing it to the libraries listed below
- CybGPT is at the forefront of integrating OpenAI's advanced GPT technology with the complex landscape of cybersecurity.☆37Updated 7 months ago
- HoneyAgents is a PoC demo of an AI-driven system that combines honeypots with autonomous AI agents to detect and mitigate cyber threats. …☆39Updated last year
- The project serves as a strategic advisory tool, capitalizing on the ZySec series of AI models to amplify the capabilities of security pr…☆43Updated 7 months ago
- ☆27Updated last month
- A collection of dashboards, templates, API's and Power BI code for vulnerability management and analysis☆13Updated 2 months ago
- Secure Jupyter Notebooks and Experimentation Environment☆64Updated this week
- ☆15Updated last month
- Agentic Workflows Made Simple☆81Updated this week
- A fun POC that is built to understand AI security agents.☆18Updated 3 weeks ago
- Code repository for "Machine Learning For Red Team Hackers".☆32Updated 4 years ago
- Class tools for overview of MITRE ATT&CK®☆34Updated 5 months ago
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆64Updated 6 months ago
- ☆15Updated 2 years ago
- A collection of agents that use Large Language Models (LLMs) to perform tasks common on our day to day jobs in cyber security.☆78Updated 8 months ago
- Defending IaaS with ATT&CK is a project to create a collection of ATT&CK techniques relevant to a Linux IaaS environment, as well as a me…☆13Updated 10 months ago
- An example vulnerable app that integrates an LLM☆15Updated 9 months ago
- An AI-powered tool for discovering privilege escalation opportunities in AWS IAM configurations.☆105Updated 3 months ago
- using ML models for red teaming☆39Updated last year
- ATHI — An AI Threat Modeling Framework for Policymakers☆47Updated last year
- Awesome products for securing AI systems includes open source and commercial options and an infographic licensed CC-BY-SA-4.0.☆55Updated 7 months ago
- Generative AI Governance for Enterprises☆14Updated 3 weeks ago
- ☆10Updated last year
- ☆33Updated last month
- Rapidly identify and mitigate container security vulnerabilities with generative AI.☆64Updated this week
- AI-powered tool designed to help security professionals detect vulnerabilities at machine speed and extract insights from extensive bug b…☆13Updated 4 months ago
- ☆11Updated last year
- The Secure Coding Framework☆21Updated 4 years ago
- InfoSec OpenAI Examples☆19Updated last year
- A set of AWS resources for testing the Log4Shell vulnerability, deployable with terraform☆12Updated 3 years ago
- Repository to archive AWS Documentation for local use☆41Updated 3 months ago