sophos / gpt3-and-cybersecurityLinks
GPT-3 use cases for Cybersecurity
☆53Updated 2 years ago
Alternatives and similar repositories for gpt3-and-cybersecurity
Users that are interested in gpt3-and-cybersecurity are comparing it to the libraries listed below
Sorting:
- CyATP: Cybersecurity Awareness Training Platform☆23Updated 3 years ago
- Cybersecurity of Machine Learning and Artificial Intelligence☆69Updated 3 years ago
- A collection of agents that use Large Language Models (LLMs) to perform tasks common on our day to day jobs in cyber security.☆229Updated last year
- ATLAS tactics, techniques, and case studies data☆91Updated 3 weeks ago
- Small web frontend for using openAI's GPT-3.5 and GPT-4's API☆59Updated 8 months ago
- Python API for vFeed Vulnerability & Threat Intelligence Database Enterprise & Pro Editions☆104Updated this week
- CALDERA plugin for adversary emulation of AI-enabled systems☆105Updated 2 years ago
- This program generates cyber attack scenarios for use in cyber training exercises, red team planning, blue team planning, automated attac…☆32Updated 4 years ago
- ☆45Updated 3 years ago
- Determine whether your compute is truly vulnerable to a specific vulnerability by accounting for all factors which affect *actual* exploi…☆141Updated 2 years ago
- Core A2P2V functionality (command line based)☆68Updated last year
- SourceGPT - prompt manager and source code analyzer built on top of ChatGPT as the oracle☆109Updated 2 years ago
- Import Mitre Att&ck into Neo4j database☆38Updated 3 years ago
- Autonomous Security Analysis and Penetration Testing☆24Updated 3 years ago
- Code for shelLM tool☆57Updated 10 months ago
- SecureBERT is a domain-specific language model to represent cybersecurity textual data.☆109Updated last year
- Open-Source Vulnerability Intelligence Center - Unified source of vulnerability, exploit and threat Intelligence feeds☆138Updated this week
- This is a dataset intended to train a LLM model for a completely CVE focused input and output.☆65Updated 5 months ago
- using ML models for red teaming☆45Updated 2 years ago
- ☆77Updated last month
- A library to produce cybersecurity exploitation routes (exploit flows). Inspired by TensorFlow.☆38Updated 2 years ago
- Machine Learning For Cybersecurity.☆68Updated 6 years ago
- Secure Jupyter Notebooks and Experimentation Environment☆84Updated 10 months ago
- Open Source Tool - Cybersecurity Graph Database in Neo4j☆66Updated 2 years ago
- Shell Language Processing (SLP). Pre-processing of sh/bash/zsh/.. commands for Machine Learning models.☆36Updated 3 weeks ago
- pretrained BERT model for cyber security text, learned CyberSecurity Knowledge☆203Updated 2 years ago
- OASIS Cyber Threat Intelligence (CTI) TC: A repository for commonly used STIX objects in order to avoid needless duplication. https://gi…☆97Updated 6 months ago
- MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.☆67Updated last year
- Linux based vulnerabilities (CVE) exploit detection through runtime security using Falco/Osquery/Yara/Sigma☆21Updated 2 years ago
- IoT and Operational Technology Honeypot☆106Updated 2 years ago