sophos / gpt3-and-cybersecurity
GPT-3 use cases for Cybersecurity
☆52Updated last year
Alternatives and similar repositories for gpt3-and-cybersecurity:
Users that are interested in gpt3-and-cybersecurity are comparing it to the libraries listed below
- Core A2P2V functionality (command line based)☆68Updated 11 months ago
- Small web frontend for using openAI's GPT-3.5 and GPT-4's API☆53Updated 2 weeks ago
- Graph Representation of MITRE ATT&CK's CTI data☆48Updated 5 years ago
- ☆43Updated 2 years ago
- Cybersecurity of Machine Learning and Artificial Intelligence☆71Updated 3 years ago
- using ML models for red teaming☆43Updated last year
- Import Mitre Att&ck into Neo4j database☆35Updated 2 years ago
- A library and command line tool for extracting indicators of compromise (IOCs) from security reports in PDF, HTML, Word, or text format☆31Updated 2 weeks ago
- ATLAS tactics, techniques, and case studies data☆63Updated last month
- Open Source Tool - Cybersecurity Graph Database in Neo4j☆59Updated last year
- DGA Detective - Hunt domains generated by Domain Generation Algorithms to identify malware traffic☆41Updated 8 months ago
- A collection of agents that use Large Language Models (LLMs) to perform tasks common on our day to day jobs in cyber security.☆103Updated 11 months ago
- Chat4GPT Experiments for Security☆11Updated 2 years ago
- CyATP: Cybersecurity Awareness Training Platform☆23Updated 3 years ago
- ReconPal: Leveraging NLP for Infosec☆56Updated 2 years ago
- This repository hosts community contributed Kestrel analytics☆17Updated 10 months ago
- Severity scoring and exploit categorisation for vulnerability reports using machine-learning tools.☆20Updated last year
- A simple tool to create mermaid js markdown charts from CVE IDs and CVE keyword searches.☆43Updated 2 years ago
- Python API for vFeed Vulnerability & Threat Intelligence Database Enterprise & Pro Editions☆100Updated last year
- ☆80Updated 2 years ago
- This tool maps a file's behavior on MITRE ATT&CK matrix.☆58Updated 5 years ago
- Cyber Threat Intelligence Data, Indicators, and Analysis☆84Updated 4 months ago
- Data Scientists Go To Jupyter☆62Updated last month
- This is a dataset intended to train a LLM model for a completely CVE focused input and output.☆59Updated 4 months ago
- SecureBERT is a domain-specific language model to represent cybersecurity textual data.☆88Updated 9 months ago
- ChatCVE is an app using the Langchain SQL Language Tool to give a LLM prompt experience to CVE and SBOM DevSecOps Triage Data☆21Updated 9 months ago
- A Crowdsourcing Exchange for mapping various sources of security vulnerabilities, exposures, threats, and controls data☆26Updated 5 years ago
- This program generates cyber attack scenarios for use in cyber training exercises, red team planning, blue team planning, automated attac…☆26Updated 4 years ago
- An HTTP Response fuzzer to find Vulnerabilities in Security Scanners☆26Updated 10 months ago
- Malicious actors often reuse code to deploy their malware, phishing website or CNC server. As a result, similiaries can be found on URLs …☆75Updated last year