A curated list of large language model tools for cybersecurity research.
☆484Apr 10, 2024Updated last year
Alternatives and similar repositories for awesome-llm-cybersecurity-tools
Users that are interested in awesome-llm-cybersecurity-tools are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- an extension for Burp Suite to allow researchers to utilize GPT for analys is of HTTP requests and responses☆113May 1, 2023Updated 2 years ago
- An AI-powered tool for discovering privilege escalation opportunities in AWS IAM configurations.☆120Mar 13, 2026Updated 2 weeks ago
- A curated list of awesome security tools, experimental case or other interesting things with LLM or GPT.☆654Mar 16, 2026Updated 2 weeks ago
- TeLL: Log Level Suggestions via Modeling Multi-Level Code Block Information, ISSTA'22☆14Jul 14, 2022Updated 3 years ago
- AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE…☆1,212Dec 29, 2025Updated 3 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ✨ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The …☆291Feb 5, 2024Updated 2 years ago
- A curation of awesome tools, documents and projects about LLM Security.☆1,554Aug 20, 2025Updated 7 months ago
- New ways of breaking app-integrated LLMs☆2,066Jul 17, 2025Updated 8 months ago
- Source code of AsiaCCS'22 paper - RecIPE: Revisiting the Evaluation of Memory Error Defenses☆13Sep 19, 2023Updated 2 years ago
- A curated list of GPT agents for cybersecurity☆6,482Jul 21, 2024Updated last year
- the LLM vulnerability scanner☆7,391Updated this week
- A Mixture‑of‑Experts Educational Framework for Adaptive Cybersecurity☆22Feb 8, 2026Updated last month
- Automating Cyber Threat Intelligence Reporting with Natural Language Generation☆15Jan 24, 2024Updated 2 years ago
- 🧠 LLMFuzzer - Fuzzing Framework for Large Language Models 🧠 LLMFuzzer is the first open-source fuzzing framework specifically designed …☆348Feb 12, 2024Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Dropbox LLM Security research code and results☆256May 21, 2024Updated last year
- An standalone execution trace library built on DynamoRIO.☆23Jul 4, 2022Updated 3 years ago
- ☆387Jun 25, 2025Updated 9 months ago
- A tool to generate macOS initial access vectors using Prelude Operator payloads☆18May 25, 2022Updated 3 years ago
- FLOWMATRIX: GPU-Assisted Information-Flow Analysis through Matrix-Based Representation, USENIX Security'22☆28Apr 17, 2023Updated 2 years ago
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆65Nov 19, 2025Updated 4 months ago
- Whois for the Cloud: Recon tool for cloud provider attribution. Supports AWS, Azure, Google, Cloudflare, and Digital Ocean.☆183Oct 9, 2025Updated 5 months ago
- Zero shot vulnerability discovery using LLMs☆2,592Feb 6, 2025Updated last year
- Apache Superset Auth Bypass (CVE-2023-27524)☆11May 9, 2023Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- OCSF Schema Validation☆12Dec 13, 2024Updated last year
- SecureBERT is a domain-specific language model to represent cybersecurity textual data.☆110Jul 19, 2024Updated last year
- Automated vulnerability discovery and annotation☆68Jul 26, 2024Updated last year
- ☆45Feb 26, 2024Updated 2 years ago
- Mapping Corelight or Zeek data to Elastic Common Schema fields☆33Mar 16, 2026Updated last week
- Automated Penetration Testing Agentic Framework Powered by Large Language Models☆12,196Feb 23, 2026Updated last month
- A curated list of amazingly awesome Cybersecurity datasets☆1,943Mar 2, 2024Updated 2 years ago
- Generate CPG for multiple languages for code and threat analysis☆11Sep 22, 2023Updated 2 years ago
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆182Mar 23, 2023Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Live validation proxy tool for testing web app vulnerabilities☆833Updated this week
- Our collection of Wazuh detection rules for our Offense Lab☆18Feb 13, 2022Updated 4 years ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆79Aug 22, 2023Updated 2 years ago
- 🖇️ equivalence table between OWASP ASVS standard and STRIDE threat modeling methodology.☆76Aug 22, 2024Updated last year
- Kaze's openly available CVE vulnerability data.☆16Apr 7, 2025Updated 11 months ago
- ☆18Jul 30, 2024Updated last year
- Finetuning large language models (LLMs) for vulnerability detection☆55Apr 2, 2025Updated 11 months ago