sophos / gpt3-and-cybersecurityLinks
GPT-3 use cases for Cybersecurity
☆51Updated last year
Alternatives and similar repositories for gpt3-and-cybersecurity
Users that are interested in gpt3-and-cybersecurity are comparing it to the libraries listed below
Sorting:
- ☆43Updated 2 years ago
- Small web frontend for using openAI's GPT-3.5 and GPT-4's API☆55Updated last month
- CyATP: Cybersecurity Awareness Training Platform☆23Updated 3 years ago
- Core A2P2V functionality (command line based)☆68Updated last year
- Import Mitre Att&ck into Neo4j database☆36Updated 2 years ago
- This is a dataset intended to train a LLM model for a completely CVE focused input and output.☆60Updated 6 months ago
- Cybersecurity of Machine Learning and Artificial Intelligence☆73Updated 3 years ago
- Linux based vulnerabilities (CVE) exploit detection through runtime security using Falco/Osquery/Yara/Sigma☆21Updated last year
- SourceGPT - prompt manager and source code analyzer built on top of ChatGPT as the oracle☆110Updated 2 years ago
- A library to produce cybersecurity exploitation routes (exploit flows). Inspired by TensorFlow.☆35Updated last year
- A collection of agents that use Large Language Models (LLMs) to perform tasks common on our day to day jobs in cyber security.☆116Updated last year
- Graph Representation of MITRE ATT&CK's CTI data☆48Updated 5 years ago
- OASIS Cyber Threat Intelligence (CTI) TC: A repository for commonly used STIX objects in order to avoid needless duplication. https://gi…☆93Updated this week
- Code for shelLM tool☆54Updated 4 months ago
- Secure Jupyter Notebooks and Experimentation Environment☆75Updated 4 months ago
- This program generates cyber attack scenarios for use in cyber training exercises, red team planning, blue team planning, automated attac…☆26Updated 4 years ago
- OASIS Cyber Threat Intelligence (CTI) TC: A tool for generating STIX content for prototyping and testing. https://github.com/oasis-open/c…☆41Updated last year
- Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogue…☆62Updated last week
- The project will serve as a central repository for VMware Threat Analysis Unit (TAU) to share threat intelligence with the security commu…☆17Updated 2 years ago
- Security Control Knowledge Graph☆28Updated last year
- Public static website for the D3FEND project. For the D3FEND ontology repo see: https://github.com/d3fend/d3fend-ontology☆83Updated last month
- Python API for vFeed Vulnerability & Threat Intelligence Database Enterprise & Pro Editions☆101Updated 2 years ago
- Pathfinder is a plugin for mapping network vulnerabilities, scanned by CALDERA or imported by a supported network scanner, and translatin…☆126Updated 2 months ago
- This tool maps a file's behavior on MITRE ATT&CK matrix.☆59Updated 5 years ago
- Open IOC sharing platform☆56Updated 6 months ago
- A library and command line tool for extracting indicators of compromise (IOCs) from security reports in PDF, HTML, Word, or text format☆33Updated this week
- Chat4GPT Experiments for Security☆11Updated 2 years ago
- This repository hosts community contributed Kestrel analytics☆17Updated last year
- SecureBERT is a domain-specific language model to represent cybersecurity textual data.☆93Updated 10 months ago
- This tool helps new security professionals actively learn how to address security concerns associated with open ports on a network device…☆22Updated 2 months ago