sophos / gpt3-and-cybersecurityLinks
GPT-3 use cases for Cybersecurity
☆53Updated 2 years ago
Alternatives and similar repositories for gpt3-and-cybersecurity
Users that are interested in gpt3-and-cybersecurity are comparing it to the libraries listed below
Sorting:
- This is a dataset intended to train a LLM model for a completely CVE focused input and output.☆66Updated 7 months ago
- ☆44Updated 3 years ago
- CyATP: Cybersecurity Awareness Training Platform☆23Updated 3 years ago
- SourceGPT - prompt manager and source code analyzer built on top of ChatGPT as the oracle☆109Updated 2 years ago
- Secure Jupyter Notebooks and Experimentation Environment☆84Updated 11 months ago
- Small web frontend for using openAI's GPT-3.5 and GPT-4's API☆59Updated 9 months ago
- Python API for vFeed Vulnerability & Threat Intelligence Database Enterprise & Pro Editions☆107Updated last month
- Cybersecurity of Machine Learning and Artificial Intelligence☆69Updated 3 years ago
- This program generates cyber attack scenarios for use in cyber training exercises, red team planning, blue team planning, automated attac…☆33Updated 4 years ago
- A collection of agents that use Large Language Models (LLMs) to perform tasks common on our day to day jobs in cyber security.☆243Updated last year
- Open Source Tool - Cybersecurity Graph Database in Neo4j☆67Updated 2 years ago
- Core A2P2V functionality (command line based)☆68Updated last year
- Collection of tool you need to have in your Endpoint Detection and Response arsenal☆112Updated last year
- IoT and Operational Technology Honeypot☆105Updated 2 years ago
- Linux based vulnerabilities (CVE) exploit detection through runtime security using Falco/Osquery/Yara/Sigma☆21Updated 2 years ago
- Automatically collects the known CVE and its corresponding Poc, and sends it to the LLM for analysis, disassembles the attack steps, gene…☆20Updated last year
- Import Mitre Att&ck into Neo4j database☆39Updated 3 years ago
- ATLAS tactics, techniques, and case studies data☆99Updated last month
- CALDERA plugin for adversary emulation of AI-enabled systems☆109Updated 2 years ago
- This tool helps new security professionals actively learn how to address security concerns associated with open ports on a network device…☆22Updated last month
- A library to produce cybersecurity exploitation routes (exploit flows). Inspired by TensorFlow.☆37Updated 2 years ago
- Code for shelLM tool☆57Updated last year
- Interactive, dynamic, and realistic LLM honeypots☆71Updated 11 months ago
- Malicious actors often reuse code to deploy their malware, phishing website or CNC server. As a result, similiaries can be found on URLs …☆75Updated 2 years ago
- an extension for Burp Suite to allow researchers to utilize GPT for analys is of HTTP requests and responses☆112Updated 2 years ago
- pretrained BERT model for cyber security text, learned CyberSecurity Knowledge☆204Updated 2 years ago
- Website defacement attack detection with deep learning☆62Updated last year
- SMET : Semantic Mapping of CVE to ATT&CK and its Application to Cybersecurity☆52Updated last year
- MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.☆67Updated last year
- Sightings Ecosystem gives cyber defenders visibility into what adversaries actually do in the wild. With your help, we are tracking MITRE…☆38Updated 8 months ago