trendmicro / cloud-risk-assessment-agentLinks
Welcome to the Cybertron AI Agent project, an open-source initiative leveraging the Trend Micro Cybertron AI model in the NIM catalog.
☆61Updated last month
Alternatives and similar repositories for cloud-risk-assessment-agent
Users that are interested in cloud-risk-assessment-agent are comparing it to the libraries listed below
Sorting:
- A Model Context Protocol (MCP) server for querying the VirusTotal API.☆82Updated 6 months ago
- CALDERA plugin for adversary emulation of AI-enabled systems☆99Updated 2 years ago
- TTPMapper is an AI-driven threat intelligence parser that converts unstructured reports whether from web URLs or PDF files into structure…☆43Updated 2 months ago
- Mapping of open-source detection rules and atomic tests.☆176Updated 7 months ago
- Code Repository for: AIRTBench: Measuring Autonomous AI Red Teaming Capabilities in Language Models☆76Updated this week
- ☆305Updated last month
- A collection of agents that use Large Language Models (LLMs) to perform tasks common on our day to day jobs in cyber security.☆152Updated last year
- ☆42Updated last month
- An index of publicly available and open-source threat detection rulesets.☆122Updated 4 months ago
- Curated resources, research, and tools for securing AI systems☆39Updated last week
- 🛡️ VIPER: Stay ahead of threats with AI-driven vulnerability intelligence. Prioritize CVEs effectively using NVD, EPSS, CISA KEV, and Go…☆77Updated 3 weeks ago
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆56Updated last week
- Intel Retrieval Augmented Generation (RAG) Utilities☆90Updated last year
- ☆17Updated 4 months ago
- yara detection rules for hunting with the threathunting-keywords project☆127Updated 3 months ago
- Convert Sigma rules to SIEM queries, directly in your browser.☆94Updated this week
- This repository contains generated contextual data utilized by pyattck.☆19Updated 6 months ago
- The objective of this program is to leverage AI-LLM technology to process of human language-based CTI documents to succinctly summarize t…☆62Updated 3 months ago
- NOVA: The Prompt Pattern Matching☆167Updated last month
- A MITRE Caldera plugin☆45Updated 9 months ago
- Slides of my public talks☆56Updated last year
- Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogue…☆73Updated last week
- ☆46Updated last week
- Autoconfigured ELK Stack That Contains All EPSS and NVD CVE Data☆52Updated 2 months ago
- Memory Forensic System on Cloud☆91Updated last year
- The principal objective of this project is to develop a knowledge base of the tactics, techniques, and procedures (TTPs) used by insiders…☆144Updated last month
- Suzaku (朱雀) is a sigma-based threat hunting and fast forensics timeline generator for cloud logs.☆146Updated this week
- This is a repository to experiment with MCP for security☆43Updated 7 months ago
- Automation tool for Windows Deception Host Burn-In☆86Updated 9 months ago
- Anvilogic Forge☆107Updated last week