sophos / gpt3-and-cybersecurity
GPT-3 use cases for Cybersecurity
☆52Updated last year
Alternatives and similar repositories for gpt3-and-cybersecurity:
Users that are interested in gpt3-and-cybersecurity are comparing it to the libraries listed below
- ☆42Updated 2 years ago
- A collection of agents that use Large Language Models (LLMs) to perform tasks common on our day to day jobs in cyber security.☆96Updated 10 months ago
- The project will serve as a central repository for VMware Threat Analysis Unit (TAU) to share threat intelligence with the security commu…☆17Updated 2 years ago
- Small web frontend for using openAI's GPT-3.5 and GPT-4's API☆52Updated 7 months ago
- This program generates cyber attack scenarios for use in cyber training exercises, red team planning, blue team planning, automated attac…☆26Updated 3 years ago
- A simple tool to create mermaid js markdown charts from CVE IDs and CVE keyword searches.☆43Updated 2 years ago
- A suite of Volatility 3 plugins for memory forensics of Docker containers☆18Updated last year
- Import Mitre Att&ck into Neo4j database☆35Updated 2 years ago
- Graph Representation of MITRE ATT&CK's CTI data☆48Updated 5 years ago
- CyATP: Cybersecurity Awareness Training Platform☆22Updated 3 years ago
- Linux based vulnerabilities (CVE) exploit detection through runtime security using Falco/Osquery/Yara/Sigma☆21Updated last year
- A library to produce cybersecurity exploitation routes (exploit flows). Inspired by TensorFlow.☆33Updated last year
- Core A2P2V functionality (command line based)☆67Updated 10 months ago
- Sightings Ecosystem gives cyber defenders visibility into what adversaries actually do in the wild. With your help, we are tracking MITRE…☆34Updated last week
- This tool maps a file's behavior on MITRE ATT&CK matrix.☆58Updated 5 years ago
- A library and command line tool for extracting indicators of compromise (IOCs) from security reports in PDF, HTML, Word, or text format☆31Updated 2 weeks ago
- All necessary code in order to feed Sysmon data into Recurrent Neural Network☆17Updated 4 years ago
- ATLAS tactics, techniques, and case studies data☆60Updated 2 weeks ago
- This repository contains generated contextual data utilized by pyattck.☆19Updated 3 weeks ago
- OpenCTI datasets☆26Updated last year
- Application for detecting command and control (C2) communication through network traffic analysis.☆14Updated last year
- SourceGPT - prompt manager and source code analyzer built on top of ChatGPT as the oracle☆110Updated last year
- ☆80Updated last year
- Python API for vFeed Vulnerability & Threat Intelligence Database Enterprise & Pro Editions☆100Updated last year
- OASIS Cyber Threat Intelligence (CTI) TC: A tool for generating STIX content for prototyping and testing. https://github.com/oasis-open/c…☆41Updated 11 months ago
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆39Updated 7 months ago
- ReconPal: Leveraging NLP for Infosec☆56Updated 2 years ago
- This is a dataset intended to train a LLM model for a completely CVE focused input and output.☆56Updated 4 months ago
- OSSEM Common Data Model☆55Updated 2 years ago
- Cybersecurity of Machine Learning and Artificial Intelligence☆71Updated 3 years ago