sophos / gpt3-and-cybersecurity
GPT-3 use cases for Cybersecurity
☆50Updated last year
Related projects: ⓘ
- A collection of agents that use Large Language Models (LLMs) to perform tasks common on our day to day jobs in cyber security.☆38Updated 4 months ago
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆20Updated 3 weeks ago
- This is a dataset intended to train a LLM model for a completely CVE focused input and output.☆39Updated 2 months ago
- Code for shelLM tool☆41Updated 9 months ago
- Graph Representation of MITRE ATT&CK's CTI data☆47Updated 4 years ago
- Chat4GPT Experiments for Security☆11Updated last year
- ☆43Updated last year
- Small web frontend for using openAI's GPT-3.5 and GPT-4's API☆50Updated last month
- This project will work towards a fully-functional autonomous intelligent cyberdefense agent with increasingly advanced capabilities that …☆27Updated last week
- ☆27Updated last week
- using ML models for red teaming☆39Updated last year
- CyATP: Cybersecurity Awareness Training Platform☆23Updated 2 years ago
- Import Mitre Att&ck into Neo4j database☆32Updated last year
- The project serves as a strategic advisory tool, capitalizing on the ZySec series of AI models to amplify the capabilities of security pr…☆28Updated 4 months ago
- pyJARM is a library for doing JARM fingerprinting using python☆50Updated 3 years ago
- A library to produce cybersecurity exploitation routes (exploit flows). Inspired by TensorFlow.☆27Updated last year
- Open Source Tool - Cybersecurity Graph Database in Neo4j☆52Updated last year
- ☆95Updated 3 months ago
- OpenCTI datasets☆21Updated 6 months ago
- A suite of Volatility 3 plugins for memory forensics of Docker containers☆17Updated 8 months ago
- A library and command line tool for extracting indicators of compromise (IOCs) from security reports in PDF, HTML, or text formats☆25Updated this week
- an extension for Burp Suite to allow researchers to utilize GPT for analys is of HTTP requests and responses☆89Updated last year
- This tool maps a file's behavior on MITRE ATT&CK matrix.☆56Updated 4 years ago
- Data Scientists Go To Jupyter☆56Updated last year
- ☆78Updated last year
- Malicious actors often reuse code to deploy their malware, phishing website or CNC server. As a result, similiaries can be found on URLs …☆74Updated 10 months ago
- vPrioritizer enables us to understand the contextualized risk (vPRisk) on asset-vulnerability relationship level across the organization,…☆69Updated 2 years ago
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)☆94Updated 3 months ago
- This repository hosts community contributed Kestrel analytics☆14Updated 3 months ago
- Sightings Ecosystem gives cyber defenders visibility into what adversaries actually do in the wild. With your help, we are tracking MITRE…☆33Updated 5 months ago