GPT-3 use cases for Cybersecurity
☆54Sep 20, 2023Updated 2 years ago
Alternatives and similar repositories for gpt3-and-cybersecurity
Users that are interested in gpt3-and-cybersecurity are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Datalake CLI scripts and python library for searching, lookuping, adding, tagging, editing score of threats in bulk☆22Feb 20, 2026Updated last month
- ChatGPT for Cybersecurity Cookbook, published by Packt☆168Mar 2, 2026Updated last month
- ☆68Oct 17, 2022Updated 3 years ago
- Exploring various defensive response options for effectively securing a 5G core-network☆42May 20, 2024Updated last year
- ☆21Dec 22, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Automatically exported from code.google.com/p/kemufuzzer☆26Mar 17, 2015Updated 11 years ago
- A PoC that uses the DirSync protocol to poll Active Directory for changes☆13Aug 16, 2020Updated 5 years ago
- A Corpus of Data from Various Cybersecurity Blogs☆15Jun 28, 2022Updated 3 years ago
- Code to generate NeuralExecs (prompt injection for LLMs)☆27Oct 5, 2025Updated 6 months ago
- Link: Black-Box Detection of Cross-Site Scripting Vulnerabilities Using Reinforcement Learning☆25Apr 28, 2022Updated 3 years ago
- Cyber Security concepts extracted from unstructured threat intelligence reports using Named Entity Recognition☆117May 27, 2023Updated 2 years ago
- Exploit for win10 SMB3.1☆18Apr 5, 2020Updated 6 years ago
- ☆56May 5, 2025Updated 11 months ago
- Property Based Testing in C++ using RapidCheck☆12Nov 8, 2017Updated 8 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- AIxCC: automated vulnerability repair via LLMs, search, and static analysis☆12Jul 16, 2024Updated last year
- ☆11Sep 7, 2023Updated 2 years ago
- Uses ChatGPT API, Bard API, and Llama2, Python-Nmap, DNS Recon, PCAP and JWT recon modules and uses the GPT3 model to create vulnerabilit…☆593Nov 9, 2024Updated last year
- Data and code related to the report "Truth, Lies, and Automation: How Language Models Could Change Disinformation"☆28May 18, 2021Updated 4 years ago
- Artificial Intelligence for Cybersecurity, published by Packt☆24Mar 2, 2026Updated last month
- CTF write-up☆34Jan 11, 2024Updated 2 years ago
- This directory contains presentations and related materials of my speaking engagements. I also use this to record historical presentation…☆17Feb 13, 2025Updated last year
- AI driven Web Application Firewall☆32Dec 12, 2022Updated 3 years ago
- Dataset contains several benign and attacks samples which can be used as values in HTTP protocol.☆55Sep 4, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Cradlepoint ECM Command Line Interface☆11Mar 7, 2023Updated 3 years ago
- ALBERT Persian Playground☆13Jun 12, 2023Updated 2 years ago
- An Ansible Role that installs ADCS on Windows Server and optionally configures Certified Preowned templates.☆20Mar 20, 2026Updated 2 weeks ago
- C11 implementation of FIPS 203 initial public draft.☆21May 16, 2024Updated last year
- Hyper-V Fuzzer using hAFL2