GPT-3 use cases for Cybersecurity
☆54Sep 20, 2023Updated 2 years ago
Alternatives and similar repositories for gpt3-and-cybersecurity
Users that are interested in gpt3-and-cybersecurity are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Code coverage calculation/monitoring tool for Corpus Distillation☆16Aug 25, 2016Updated 9 years ago
- Datalake CLI scripts and python library for searching, lookuping, adding, tagging, editing score of threats in bulk☆22Feb 20, 2026Updated 3 months ago
- ChatGPT for Cybersecurity Cookbook, published by Packt☆171Apr 22, 2026Updated 3 weeks ago
- Prompts for ChatGPT 4 useful for developers, cybersecurity professionals, hackers and IT workers☆12Mar 20, 2023Updated 3 years ago
- ☆21Dec 22, 2021Updated 4 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- DHCP Client Daemon☆14May 8, 2026Updated last week
- Link: Black-Box Detection of Cross-Site Scripting Vulnerabilities Using Reinforcement Learning☆25Apr 28, 2022Updated 4 years ago
- Cyber Security concepts extracted from unstructured threat intelligence reports using Named Entity Recognition☆118May 27, 2023Updated 2 years ago
- Pure-Rust DTLS☆12Nov 12, 2022Updated 3 years ago
- Exploit for win10 SMB3.1☆17Apr 5, 2020Updated 6 years ago
- Source code for 'Make a 2D Arcade Game in a Weekend' by Jodessiah Sumpter☆13Mar 28, 2017Updated 9 years ago
- A Python port of the R implementation of Kleinberg's burst detection algorithm☆12Apr 11, 2022Updated 4 years ago
- Repo for MGraph project☆13Jan 10, 2026Updated 4 months ago
- code and data for paper "Automatic Generation and Summarization of Shellcode via Transformer and Dual Learning", which accepted in SANER …☆12May 8, 2022Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆11Sep 7, 2023Updated 2 years ago
- frozenkp's CTF Writeups & useful tools☆19Jun 29, 2020Updated 5 years ago
- Artificial Intelligence for Cybersecurity, published by Packt☆26Mar 2, 2026Updated 2 months ago
- Data and code related to the report "Truth, Lies, and Automation: How Language Models Could Change Disinformation"☆28May 18, 2021Updated 5 years ago
- AI driven Web Application Firewall☆32Dec 12, 2022Updated 3 years ago
- SAML2 Burp Extension☆34Feb 24, 2026Updated 2 months ago
- C11 implementation of FIPS 203 initial public draft.☆21May 16, 2024Updated 2 years ago
- Hyper-V Fuzzer using hAFL2☆11May 10, 2022Updated 4 years ago
- Learning Manipulation-Invariant Image Similarity for Detecting Re-Use of Images in Scientific Publications☆22Jun 24, 2021Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Modelling Capture-the-Flag Challenges Using Reinforcement Learning☆15Jul 30, 2022Updated 3 years ago
- DNS tunneling implemented in Python☆19Jan 5, 2024Updated 2 years ago
- ☆15Mar 9, 2025Updated last year
- An Ansible Role that installs ADCS on Windows Server and optionally configures Certified Preowned templates.☆22Mar 20, 2026Updated 2 months ago
- ☆21Jun 27, 2023Updated 2 years ago
- A curated list of awesome threat detection and hunting resources☆10Mar 23, 2018Updated 8 years ago
- Black Hat EU 2018 - Don't Eat Spaghetti with a Spoon - An Analysis of the Practical Value of Threat Intelligence☆22Jan 14, 2019Updated 7 years ago
- The code implementation of GraCeFul (Accepted in COLING 2025)☆13Jan 27, 2025Updated last year
- The MITRE ATT&CK Mapping Datasets☆21Jan 23, 2024Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- NLP model and tech for cyber security tasks☆86Mar 22, 2023Updated 3 years ago
- A list of wireless cards tested with the dual-card injection test and in the field☆27Oct 21, 2018Updated 7 years ago
- Fully based on Advanced Windows exploitation. Kernel driver exploitation, browser exploitation, heap spraying etc....☆14Nov 1, 2020Updated 5 years ago
- shadow tls client☆15Dec 30, 2022Updated 3 years ago
- T&C and Privacy Policy for our website: https://radicallyopensecurity.com/☆17Apr 23, 2026Updated 3 weeks ago
- My dot files and other profile settings☆18Apr 14, 2026Updated last month
- Share your Yara rules with VirusTotal☆27Aug 12, 2024Updated last year