A curated list of large language model tools for cybersecurity research.
☆486Apr 10, 2024Updated 2 years ago
Alternatives and similar repositories for awesome-llm-cybersecurity-tools
Users that are interested in awesome-llm-cybersecurity-tools are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- an extension for Burp Suite to allow researchers to utilize GPT for analys is of HTTP requests and responses☆114May 1, 2023Updated 3 years ago
- An AI-powered tool for discovering privilege escalation opportunities in AWS IAM configurations.☆121Apr 17, 2026Updated 3 weeks ago
- An overview of LLMs for cybersecurity.☆1,304Apr 16, 2026Updated 3 weeks ago
- A curated list of awesome security tools, experimental case or other interesting things with LLM or GPT.☆656Apr 28, 2026Updated last week
- TeLL: Log Level Suggestions via Modeling Multi-Level Code Block Information, ISSTA'22☆14Jul 14, 2022Updated 3 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE…☆1,219Dec 29, 2025Updated 4 months ago
- ✨ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The …☆291Feb 5, 2024Updated 2 years ago
- A curation of awesome tools, documents and projects about LLM Security.☆1,578Aug 20, 2025Updated 8 months ago
- New ways of breaking app-integrated LLMs☆2,083Jul 17, 2025Updated 9 months ago
- Source code of AsiaCCS'22 paper - RecIPE: Revisiting the Evaluation of Memory Error Defenses☆13Sep 19, 2023Updated 2 years ago
- A curated list of GPT agents for cybersecurity☆6,506Jul 21, 2024Updated last year
- the LLM vulnerability scanner☆7,756Updated this week
- A Mixture‑of‑Experts Educational Framework for Adaptive Cybersecurity☆22Feb 8, 2026Updated 3 months ago
- Automating Cyber Threat Intelligence Reporting with Natural Language Generation☆15Jan 24, 2024Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- 🧠 LLMFuzzer - Fuzzing Framework for Large Language Models 🧠 LLMFuzzer is the first open-source fuzzing framework specifically designed …☆348Feb 12, 2024Updated 2 years ago
- Dropbox LLM Security research code and results☆257May 21, 2024Updated last year
- An standalone execution trace library built on DynamoRIO.☆23Jul 4, 2022Updated 3 years ago
- ☆400Jun 25, 2025Updated 10 months ago
- ☆27Feb 4, 2025Updated last year
- FLOWMATRIX: GPU-Assisted Information-Flow Analysis through Matrix-Based Representation, USENIX Security'22☆28Apr 17, 2023Updated 3 years ago
- Whois for the Cloud: Recon tool for cloud provider attribution. Supports AWS, Azure, Google, Cloudflare, and Digital Ocean.☆185Oct 9, 2025Updated 7 months ago
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆70Nov 19, 2025Updated 5 months ago
- Zero shot vulnerability discovery using LLMs☆2,645Feb 6, 2025Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- OCSF Schema Validation☆12Updated this week
- Apache Superset Auth Bypass (CVE-2023-27524)☆11May 9, 2023Updated 3 years ago
- SecureBERT is a domain-specific language model to represent cybersecurity textual data.☆112Jul 19, 2024Updated last year
- Automated vulnerability discovery and annotation☆67Jul 26, 2024Updated last year
- ☆46Feb 26, 2024Updated 2 years ago
- Mapping Corelight or Zeek data to Elastic Common Schema fields☆33Apr 24, 2026Updated 2 weeks ago
- A curated list of amazingly awesome Cybersecurity datasets☆1,967Mar 2, 2024Updated 2 years ago
- Generate CPG for multiple languages for code and threat analysis☆12Sep 22, 2023Updated 2 years ago
- Automated Penetration Testing Agentic Framework Powered by Large Language Models☆12,920Feb 23, 2026Updated 2 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Live validation proxy tool for testing web app vulnerabilities☆854Mar 24, 2026Updated last month
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆181Mar 23, 2023Updated 3 years ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆79Aug 22, 2023Updated 2 years ago
- A Burp Suite extension that integrates OpenAI's GPT to perform an additional passive scan for discovering highly bespoke vulnerabilities …☆2,290Jun 9, 2024Updated last year
- 🖇️ equivalence table between OWASP ASVS standard and STRIDE threat modeling methodology.☆76Aug 22, 2024Updated last year
- Kaze's openly available CVE vulnerability data.☆16Apr 7, 2025Updated last year
- ☆18Jul 30, 2024Updated last year