sophos / gpt3-and-cybersecurityLinks
GPT-3 use cases for Cybersecurity
☆52Updated 2 years ago
Alternatives and similar repositories for gpt3-and-cybersecurity
Users that are interested in gpt3-and-cybersecurity are comparing it to the libraries listed below
Sorting:
- This is a dataset intended to train a LLM model for a completely CVE focused input and output.☆63Updated 4 months ago
- Cybersecurity of Machine Learning and Artificial Intelligence☆69Updated 3 years ago
- ATLAS tactics, techniques, and case studies data☆85Updated 3 weeks ago
- CyATP: Cybersecurity Awareness Training Platform☆23Updated 3 years ago
- SourceGPT - prompt manager and source code analyzer built on top of ChatGPT as the oracle☆109Updated 2 years ago
- Core A2P2V functionality (command line based)☆68Updated last year
- A library to produce cybersecurity exploitation routes (exploit flows). Inspired by TensorFlow.☆38Updated 2 years ago
- ☆44Updated 2 years ago
- A collection of agents that use Large Language Models (LLMs) to perform tasks common on our day to day jobs in cyber security.☆200Updated last year
- Small web frontend for using openAI's GPT-3.5 and GPT-4's API☆57Updated 6 months ago
- Secure Jupyter Notebooks and Experimentation Environment☆84Updated 9 months ago
- IoT and Operational Technology Honeypot☆104Updated 2 years ago
- Open-Source Vulnerability Intelligence Center - Unified source of vulnerability, exploit and threat Intelligence feeds☆135Updated this week
- Interactive, dynamic, and realistic LLM honeypots☆67Updated 8 months ago
- Import Mitre Att&ck into Neo4j database☆37Updated 2 years ago
- Website defacement attack detection with deep learning☆62Updated 9 months ago
- pretrained BERT model for cyber security text, learned CyberSecurity Knowledge☆199Updated 2 years ago
- CALDERA plugin for adversary emulation of AI-enabled systems☆103Updated 2 years ago
- Code for shelLM tool☆56Updated 9 months ago
- This program generates cyber attack scenarios for use in cyber training exercises, red team planning, blue team planning, automated attac…☆30Updated 4 years ago
- SMET : Semantic Mapping of CVE to ATT&CK and its Application to Cybersecurity☆51Updated last year
- Python API for vFeed Vulnerability & Threat Intelligence Database Enterprise & Pro Editions☆102Updated last month
- Collection of tool you need to have in your Endpoint Detection and Response arsenal☆108Updated last year
- An ever-growing list of resources for data-driven vulnerability assessment and prioritization☆129Updated 2 years ago
- an extension for Burp Suite to allow researchers to utilize GPT for analys is of HTTP requests and responses☆112Updated 2 years ago
- A suite of Volatility 3 plugins for memory forensics of Docker containers☆19Updated last year
- Autonomous Security Analysis and Penetration Testing☆24Updated 2 years ago
- SecureBERT is a domain-specific language model to represent cybersecurity textual data.☆102Updated last year
- This tool helps new security professionals actively learn how to address security concerns associated with open ports on a network device…☆23Updated 7 months ago
- Linux based vulnerabilities (CVE) exploit detection through runtime security using Falco/Osquery/Yara/Sigma☆21Updated last year