tenable / awesome-llm-cybersecurity-tools
A curated list of large language model tools for cybersecurity research.
☆430Updated 10 months ago
Alternatives and similar repositories for awesome-llm-cybersecurity-tools:
Users that are interested in awesome-llm-cybersecurity-tools are comparing it to the libraries listed below
- A curated list of awesome security tools, experimental case or other interesting things with LLM or GPT.☆574Updated last month
- An overview of LLMs for cybersecurity.☆651Updated last month
- some prompt about cyber security☆178Updated last year
- AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE…☆1,079Updated 2 weeks ago
- an extension for Burp Suite to allow researchers to utilize GPT for analys is of HTTP requests and responses☆100Updated last year
- ☆218Updated last month
- A collection of awesome resources related AI security☆174Updated 2 weeks ago
- 🧠 LLMFuzzer - Fuzzing Framework for Large Language Models 🧠 LLMFuzzer is the first open-source fuzzing framework specifically designed …☆258Updated last year
- ⚡ Vigil ⚡ Detect prompt injections, jailbreaks, and other potentially risky Large Language Model (LLM) inputs☆350Updated last year
- Every practical and proposed defense against prompt injection.☆388Updated 8 months ago
- Learn AI security through a series of vulnerable LLM CTF challenges. No sign ups, no cloud fees, run everything locally on your system.☆272Updated 6 months ago
- CALDERA plugin for adversary emulation of AI-enabled systems☆90Updated last year
- Dropbox LLM Security research code and results☆220Updated 9 months ago
- A collection of agents that use Large Language Models (LLMs) to perform tasks common on our day to day jobs in cyber security.☆85Updated 9 months ago
- A curated list of MLSecOps tools, articles and other resources on security applied to Machine Learning and MLOps systems.☆290Updated 2 months ago
- TRAM is an open-source platform designed to advance research into automating the mapping of cyber threat intelligence reports to MITRE AT…☆471Updated 3 months ago
- ☆359Updated 10 months ago
- Make your GenAI Apps Safe & Secure Test & harden your system prompt☆435Updated 4 months ago
- Delving into the Realm of LLM Security: An Exploration of Offensive and Defensive Tools, Unveiling Their Present Capabilities.☆158Updated last year
- OWASP Foundation Web Respository☆661Updated this week
- A python module for working with ATT&CK☆511Updated last month
- Test Software for the Characterization of AI Technologies☆239Updated this week
- pretrained BERT model for cyber security text, learned CyberSecurity Knowledge☆170Updated last year
- ☆197Updated last year
- OWASP Foundation Web Respository☆234Updated this week
- Attack Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by devel…☆584Updated last month
- One Conference 2024☆105Updated 4 months ago
- STIX data representing MITRE ATT&CK☆366Updated 3 months ago
- Galah: An LLM-powered web honeypot.☆491Updated 4 months ago
- Protection against Model Serialization Attacks☆398Updated this week