A curated list of large language model tools for cybersecurity research.
☆485Apr 10, 2024Updated 2 years ago
Alternatives and similar repositories for awesome-llm-cybersecurity-tools
Users that are interested in awesome-llm-cybersecurity-tools are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- an extension for Burp Suite to allow researchers to utilize GPT for analys is of HTTP requests and responses☆113May 1, 2023Updated 2 years ago
- An AI-powered tool for discovering privilege escalation opportunities in AWS IAM configurations.☆120Apr 9, 2026Updated last week
- An overview of LLMs for cybersecurity.☆1,284Mar 18, 2026Updated last month
- A curated list of awesome security tools, experimental case or other interesting things with LLM or GPT.☆652Mar 16, 2026Updated last month
- TeLL: Log Level Suggestions via Modeling Multi-Level Code Block Information, ISSTA'22☆14Jul 14, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE…☆1,216Dec 29, 2025Updated 3 months ago
- ✨ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The …☆291Feb 5, 2024Updated 2 years ago
- A curation of awesome tools, documents and projects about LLM Security.☆1,565Aug 20, 2025Updated 7 months ago
- New ways of breaking app-integrated LLMs☆2,067Jul 17, 2025Updated 9 months ago
- Source code of AsiaCCS'22 paper - RecIPE: Revisiting the Evaluation of Memory Error Defenses☆13Sep 19, 2023Updated 2 years ago
- A curated list of GPT agents for cybersecurity☆6,485Jul 21, 2024Updated last year
- the LLM vulnerability scanner☆7,559Updated this week
- A minimal self-replicating agent based on GPT-3.5/4☆63Apr 13, 2023Updated 3 years ago
- A Mixture‑of‑Experts Educational Framework for Adaptive Cybersecurity☆22Feb 8, 2026Updated 2 months ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Automating Cyber Threat Intelligence Reporting with Natural Language Generation☆15Jan 24, 2024Updated 2 years ago
- 🧠 LLMFuzzer - Fuzzing Framework for Large Language Models 🧠 LLMFuzzer is the first open-source fuzzing framework specifically designed …☆345Feb 12, 2024Updated 2 years ago
- Dropbox LLM Security research code and results☆256May 21, 2024Updated last year
- ☆391Jun 25, 2025Updated 9 months ago
- An standalone execution trace library built on DynamoRIO.☆23Jul 4, 2022Updated 3 years ago
- ☆27Feb 4, 2025Updated last year
- FLOWMATRIX: GPU-Assisted Information-Flow Analysis through Matrix-Based Representation, USENIX Security'22☆28Apr 17, 2023Updated 3 years ago
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆66Nov 19, 2025Updated 5 months ago
- Whois for the Cloud: Recon tool for cloud provider attribution. Supports AWS, Azure, Google, Cloudflare, and Digital Ocean.☆182Oct 9, 2025Updated 6 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Apache Superset Auth Bypass (CVE-2023-27524)☆11May 9, 2023Updated 2 years ago
- OCSF Schema Validation☆12Dec 13, 2024Updated last year
- SecureBERT is a domain-specific language model to represent cybersecurity textual data.☆110Jul 19, 2024Updated last year
- Automated vulnerability discovery and annotation☆67Jul 26, 2024Updated last year
- ☆45Feb 26, 2024Updated 2 years ago
- Mapping Corelight or Zeek data to Elastic Common Schema fields☆33Apr 8, 2026Updated last week
- A curated list of amazingly awesome Cybersecurity datasets☆1,953Mar 2, 2024Updated 2 years ago
- Generate CPG for multiple languages for code and threat analysis☆11Sep 22, 2023Updated 2 years ago
- Automated Penetration Testing Agentic Framework Powered by Large Language Models☆12,547Feb 23, 2026Updated last month
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆181Mar 23, 2023Updated 3 years ago
- Live validation proxy tool for testing web app vulnerabilities☆848Mar 24, 2026Updated 3 weeks ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆79Aug 22, 2023Updated 2 years ago
- A Burp Suite extension that integrates OpenAI's GPT to perform an additional passive scan for discovering highly bespoke vulnerabilities …☆2,289Jun 9, 2024Updated last year
- 🖇️ equivalence table between OWASP ASVS standard and STRIDE threat modeling methodology.☆76Aug 22, 2024Updated last year
- Kaze's openly available CVE vulnerability data.☆16Apr 7, 2025Updated last year
- ☆18Jul 30, 2024Updated last year