GPT-3 use cases for Cybersecurity
☆54Sep 20, 2023Updated 2 years ago
Alternatives and similar repositories for gpt3-and-cybersecurity
Users that are interested in gpt3-and-cybersecurity are comparing it to the libraries listed below
Sorting:
- ☆68Oct 17, 2022Updated 3 years ago
- Exploring various defensive response options for effectively securing a 5G core-network☆42May 20, 2024Updated last year
- All the files and code needed to clone yourself using GPT3☆17Jan 6, 2023Updated 3 years ago
- A PoC that uses the DirSync protocol to poll Active Directory for changes☆13Aug 16, 2020Updated 5 years ago
- Link: Black-Box Detection of Cross-Site Scripting Vulnerabilities Using Reinforcement Learning☆25Apr 28, 2022Updated 3 years ago
- How to bypass your Bell Aliant provided modems.☆13Feb 2, 2026Updated last month
- Cyber Security concepts extracted from unstructured threat intelligence reports using Named Entity Recognition☆116May 27, 2023Updated 2 years ago
- ☆33Mar 12, 2026Updated last week
- ☆56May 5, 2025Updated 10 months ago
- The Core Objective Functions are the solution to the Control Problem. They will result in a benevolent and trustworthy AGI.☆28Mar 10, 2022Updated 4 years ago
- This will create a health report for every machines in an MSP/EDB/Single Sophos Central console☆14Nov 11, 2025Updated 4 months ago
- Property Based Testing in C++ using RapidCheck☆12Nov 8, 2017Updated 8 years ago
- Ludus role for deploying a Mythic Teamserver onto Linux servers☆23Mar 16, 2025Updated last year
- ☆11Sep 7, 2023Updated 2 years ago
- AIxCC: automated vulnerability repair via LLMs, search, and static analysis☆11Jul 16, 2024Updated last year
- Uses ChatGPT API, Bard API, and Llama2, Python-Nmap, DNS Recon, PCAP and JWT recon modules and uses the GPT3 model to create vulnerabilit…☆590Nov 9, 2024Updated last year
- frozenkp's CTF Writeups & useful tools☆19Jun 29, 2020Updated 5 years ago
- Data and code related to the report "Truth, Lies, and Automation: How Language Models Could Change Disinformation"☆28May 18, 2021Updated 4 years ago
- Feature engineering done with Polars☆10Sep 30, 2024Updated last year
- CTF write-up☆35Jan 11, 2024Updated 2 years ago
- AI driven Web Application Firewall☆32Dec 12, 2022Updated 3 years ago
- A curated list of awesome malware analysis tools and resources☆16Mar 14, 2018Updated 8 years ago
- DNS tunneling implemented in Python☆18Jan 5, 2024Updated 2 years ago
- ALBERT Persian Playground☆13Jun 12, 2023Updated 2 years ago
- Rules and decoders for Wazuh to process the syslog from Sophos firewalls☆15Jan 24, 2026Updated last month
- An Ansible Role that installs ADCS on Windows Server and optionally configures Certified Preowned templates.☆17Jan 22, 2026Updated last month
- Hyper-V Fuzzer using hAFL2☆11May 10, 2022Updated 3 years ago
- DNS tunneling over DoH Dataset☆11Mar 9, 2023Updated 3 years ago
- xmo-remote-client: a clone of xmo-client found in Sagemcom CPEs, utilizing sagemcom-api library☆18Jan 2, 2026Updated 2 months ago
- Extracting Attack Behavior from Threat Reports☆81Apr 28, 2023Updated 2 years ago
- Modelling Capture-the-Flag Challenges Using Reinforcement Learning☆15Jul 30, 2022Updated 3 years ago
- Some extracted Features\IoCs\Artifacts\Patterns from APT Malware☆14Mar 4, 2020Updated 6 years ago
- Golang client for the BT Home Hub router☆12Oct 3, 2020Updated 5 years ago
- A very aggressive blocklist for PiHole. This is a high maintenance list you will spend a lot of time manually unblocking things.☆13Nov 20, 2025Updated 4 months ago
- ☆13Jun 1, 2022Updated 3 years ago
- The MITRE ATT&CK Mapping Datasets☆19Jan 23, 2024Updated 2 years ago
- A curated list of awesome threat detection and hunting resources☆10Mar 23, 2018Updated 7 years ago
- ☆16May 15, 2025Updated 10 months ago
- A TypeScript Framework for non-spa pages☆11Jan 21, 2026Updated last month