sophos / gpt3-and-cybersecurity
GPT-3 use cases for Cybersecurity
☆52Updated last year
Alternatives and similar repositories for gpt3-and-cybersecurity:
Users that are interested in gpt3-and-cybersecurity are comparing it to the libraries listed below
- ☆41Updated 2 years ago
- using ML models for red teaming☆42Updated last year
- Cybersecurity of Machine Learning and Artificial Intelligence☆69Updated 2 years ago
- Graph Representation of MITRE ATT&CK's CTI data☆48Updated 5 years ago
- A Crowdsourcing Exchange for mapping various sources of security vulnerabilities, exposures, threats, and controls data☆26Updated 5 years ago
- Core A2P2V functionality (command line based)☆67Updated 9 months ago
- SecureBERT is a domain-specific language model to represent cybersecurity textual data.☆85Updated 7 months ago
- A collection of agents that use Large Language Models (LLMs) to perform tasks common on our day to day jobs in cyber security.☆86Updated 9 months ago
- OpenCTI datasets☆26Updated 11 months ago
- A library and command line tool for extracting indicators of compromise (IOCs) from security reports in PDF, HTML, Word, or text format☆30Updated last month
- This program generates cyber attack scenarios for use in cyber training exercises, red team planning, blue team planning, automated attac…☆26Updated 3 years ago
- OSSEM Common Data Model☆55Updated 2 years ago
- OASIS Cyber Threat Intelligence (CTI) TC: A repository for commonly used STIX objects in order to avoid needless duplication. https://gi…☆91Updated this week
- Import Mitre Att&ck into Neo4j database☆34Updated 2 years ago
- Generate JSON force-directed/ node graph data from MITRE's ATTACK framework and visualize it interactively☆22Updated 3 years ago
- Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogue…☆54Updated this week
- Sightings Ecosystem gives cyber defenders visibility into what adversaries actually do in the wild. With your help, we are tracking MITRE…☆34Updated 11 months ago
- All necessary code in order to feed Sysmon data into Recurrent Neural Network☆17Updated 4 years ago
- Python API for vFeed Vulnerability & Threat Intelligence Database Enterprise & Pro Editions☆99Updated last year
- Tools used by CSIRT and especially in the scope of CNW☆16Updated 5 months ago
- This is a project of "Cybersecurity Event Detection with New and Re-emerging Words". (ASIACCS 2020)☆28Updated 10 months ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- This repository hosts community contributed Kestrel analytics☆17Updated 9 months ago
- Chat4GPT Experiments for Security☆11Updated last year
- This tool maps a file's behavior on MITRE ATT&CK matrix.☆58Updated 4 years ago
- ☆27Updated 4 years ago
- DGA Detective - Hunt domains generated by Domain Generation Algorithms to identify malware traffic☆40Updated 7 months ago
- An extended version of SecureBERT, trained on top of both base and large version of RoBERTa using 10 GB cybersecurity-related data☆20Updated last year
- This program exports MITRE ATT&CK framework in ELK dashboard☆78Updated 2 years ago
- MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.☆62Updated 11 months ago