sophos / gpt3-and-cybersecurity
GPT-3 use cases for Cybersecurity
☆51Updated last year
Related projects ⓘ
Alternatives and complementary repositories for gpt3-and-cybersecurity
- A collection of agents that use Large Language Models (LLMs) to perform tasks common on our day to day jobs in cyber security.☆56Updated 6 months ago
- Cybersecurity of Machine Learning and Artificial Intelligence☆67Updated 2 years ago
- Small web frontend for using openAI's GPT-3.5 and GPT-4's API☆52Updated 3 months ago
- Core A2P2V functionality (command line based)☆67Updated 6 months ago
- Import Mitre Att&ck into Neo4j database☆33Updated last year
- ☆41Updated last year
- CALDERA plugin for adversary emulation of AI-enabled systems☆85Updated last year
- A library and command line tool for extracting indicators of compromise (IOCs) from security reports in PDF, HTML, Word, or text format☆27Updated last month
- ATLAS tactics, techniques, and case studies data☆49Updated last month
- ☆29Updated this week
- All necessary code in order to feed Sysmon data into Recurrent Neural Network☆17Updated 4 years ago
- ☆19Updated 3 years ago
- This is a dataset intended to train a LLM model for a completely CVE focused input and output.☆44Updated last week
- This repository hosts community contributed Kestrel analytics☆15Updated 5 months ago
- Graph Representation of MITRE ATT&CK's CTI data☆48Updated 5 years ago
- Cyber Threat Intelligence Data, Indicators, and Analysis☆74Updated last month
- DGA Detective - Hunt domains generated by Domain Generation Algorithms to identify malware traffic☆38Updated 3 months ago
- This program generates cyber attack scenarios for use in cyber training exercises, red team planning, blue team planning, automated attac…☆24Updated 3 years ago
- an automatic penetration testing tool☆39Updated 3 years ago
- CyATP: Cybersecurity Awareness Training Platform☆23Updated 2 years ago
- pretrained BERT model for cyber security text, learned CyberSecurity Knowledge☆159Updated last year
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆23Updated 3 months ago
- MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.☆60Updated 7 months ago
- An HTTP Response fuzzer to find Vulnerabilities in Security Scanners☆26Updated 5 months ago
- This tool maps a file's behavior on MITRE ATT&CK matrix.☆57Updated 4 years ago
- Security ML models encoded as Yara rules☆211Updated last year
- OpenCTI datasets☆23Updated 8 months ago
- Malicious actors often reuse code to deploy their malware, phishing website or CNC server. As a result, similiaries can be found on URLs …☆74Updated last year
- Code for shelLM tool☆46Updated 3 weeks ago
- A simple tool to create mermaid js markdown charts from CVE IDs and CVE keyword searches.☆42Updated last year