sophos / gpt3-and-cybersecurityLinks
GPT-3 use cases for Cybersecurity
☆53Updated 2 years ago
Alternatives and similar repositories for gpt3-and-cybersecurity
Users that are interested in gpt3-and-cybersecurity are comparing it to the libraries listed below
Sorting:
- Core A2P2V functionality (command line based)☆68Updated last year
- ☆44Updated 3 years ago
- CyATP: Cybersecurity Awareness Training Platform☆23Updated 3 years ago
- Python API for vFeed Vulnerability & Threat Intelligence Database Enterprise & Pro Editions☆107Updated last month
- Cybersecurity of Machine Learning and Artificial Intelligence☆69Updated 3 years ago
- This program generates cyber attack scenarios for use in cyber training exercises, red team planning, blue team planning, automated attac…☆33Updated 4 years ago
- CALDERA plugin for adversary emulation of AI-enabled systems☆109Updated 2 years ago
- Small web frontend for using openAI's GPT-3.5 and GPT-4's API☆59Updated 9 months ago
- IoT and Operational Technology Honeypot☆105Updated 2 years ago
- All necessary code in order to feed Sysmon data into Recurrent Neural Network☆17Updated 5 years ago
- This is a dataset intended to train a LLM model for a completely CVE focused input and output.☆66Updated 7 months ago
- Code for shelLM tool☆57Updated last year
- This project will work towards a fully-functional autonomous intelligent cyberdefense agent with increasingly advanced capabilities that …☆41Updated last year
- A collection of agents that use Large Language Models (LLMs) to perform tasks common on our day to day jobs in cyber security.☆243Updated last year
- Linux based vulnerabilities (CVE) exploit detection through runtime security using Falco/Osquery/Yara/Sigma☆21Updated 2 years ago
- ATLAS tactics, techniques, and case studies data☆99Updated last month
- Import Mitre Att&ck into Neo4j database☆39Updated 3 years ago
- pyJARM is a library for doing JARM fingerprinting using python☆50Updated 10 months ago
- Malicious actors often reuse code to deploy their malware, phishing website or CNC server. As a result, similiaries can be found on URLs …☆75Updated 2 years ago
- an extension for Burp Suite to allow researchers to utilize GPT for analys is of HTTP requests and responses☆112Updated 2 years ago
- SourceGPT - prompt manager and source code analyzer built on top of ChatGPT as the oracle☆109Updated 2 years ago
- NVD/CVE as JSON files☆124Updated this week
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)☆103Updated 6 months ago
- Sightings Ecosystem gives cyber defenders visibility into what adversaries actually do in the wild. With your help, we are tracking MITRE…☆38Updated 8 months ago
- MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.☆67Updated last year
- Static Token And Credential Scanner☆95Updated 2 years ago
- using ML models for red teaming☆45Updated 2 years ago
- AI-powered security operations with Wazuh SIEM + Claude Desktop. Natural language threat detection, automated incident response & compli…☆112Updated last week
- Open-Source Vulnerability Intelligence Center - Unified source of vulnerability, exploit and threat Intelligence feeds☆140Updated this week
- Severity scoring and exploit categorisation for vulnerability reports using machine-learning tools.☆25Updated 2 years ago