sophos / gpt3-and-cybersecurity
GPT-3 use cases for Cybersecurity
☆52Updated last year
Alternatives and similar repositories for gpt3-and-cybersecurity:
Users that are interested in gpt3-and-cybersecurity are comparing it to the libraries listed below
- A collection of agents that use Large Language Models (LLMs) to perform tasks common on our day to day jobs in cyber security.☆80Updated 8 months ago
- Graph Representation of MITRE ATT&CK's CTI data☆48Updated 5 years ago
- SecureBERT is a domain-specific language model to represent cybersecurity textual data.☆81Updated 6 months ago
- This program generates cyber attack scenarios for use in cyber training exercises, red team planning, blue team planning, automated attac…☆26Updated 3 years ago
- ☆41Updated 2 years ago
- An extended version of SecureBERT, trained on top of both base and large version of RoBERTa using 10 GB cybersecurity-related data☆17Updated last year
- ☆101Updated 7 months ago
- All necessary code in order to feed Sysmon data into Recurrent Neural Network☆17Updated 4 years ago
- DGA Detective - Hunt domains generated by Domain Generation Algorithms to identify malware traffic☆39Updated 5 months ago
- Core A2P2V functionality (command line based)☆67Updated 8 months ago
- OSSEM Common Data Model☆55Updated 2 years ago
- Small web frontend for using openAI's GPT-3.5 and GPT-4's API☆52Updated 5 months ago
- Malicious actors often reuse code to deploy their malware, phishing website or CNC server. As a result, similiaries can be found on URLs …☆74Updated last year
- A Crowdsourcing Exchange for mapping various sources of security vulnerabilities, exposures, threats, and controls data☆26Updated 5 years ago
- Code for shelLM tool☆49Updated this week
- A library and command line tool for extracting indicators of compromise (IOCs) from security reports in PDF, HTML, Word, or text format☆30Updated this week
- Import Mitre Att&ck into Neo4j database☆34Updated 2 years ago
- This tool maps a file's behavior on MITRE ATT&CK matrix.☆57Updated 4 years ago
- This repository hosts community contributed Kestrel analytics☆16Updated 8 months ago
- OASIS Cyber Threat Intelligence (CTI) TC: A repository for commonly used STIX objects in order to avoid needless duplication. https://gi…☆89Updated this week
- CALDERA plugin for adversary emulation of AI-enabled systems☆87Updated last year
- Data Scientists Go To Jupyter☆62Updated 2 months ago
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)☆97Updated 2 weeks ago
- A MITRE Caldera plugin☆40Updated 2 months ago
- Cybersecurity of Machine Learning and Artificial Intelligence☆67Updated 2 years ago
- Sensor Mappings to ATT&CK is a collection of resources to assist cyber defenders with understanding which sensors and events can help det…☆49Updated 7 months ago
- ☆29Updated last week
- The project will serve as a central repository for VMware Threat Analysis Unit (TAU) to share threat intelligence with the security commu…☆16Updated last year
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- Generate JSON force-directed/ node graph data from MITRE's ATTACK framework and visualize it interactively☆22Updated 3 years ago