AI agent for autonomous cyber operations
☆496Nov 29, 2025Updated 3 months ago
Alternatives and similar repositories for Cyber-AutoAgent
Users that are interested in Cyber-AutoAgent are comparing it to the libraries listed below
Sorting:
- XBOW Validation Benchmarks☆505Jun 18, 2025Updated 8 months ago
- A small go harness that uses Ollama to orchestrate LLMs in a restricted process flow☆16Sep 10, 2024Updated last year
- Tool to query the RIPE database☆11Jun 2, 2025Updated 9 months ago
- A cybersecurity challenge, based on a real world finding☆12Jul 11, 2024Updated last year
- LLM-Powered Code Security Scanning☆20Apr 2, 2025Updated 11 months ago
- ☆203Dec 13, 2025Updated 2 months ago
- View screenshots as a slideshow over http☆15Mar 13, 2020Updated 5 years ago
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆36Nov 12, 2025Updated 3 months ago
- Raptor turns Claude Code into a general-purpose AI offensive/defensive security agent. By using Claude.md and creating rules, sub-agents,…☆1,442Updated this week
- GitHub Action to alert on security patches before the CVE drops.☆180Feb 28, 2026Updated last week
- The project serves as a strategic advisory tool, capitalizing on the ZySec series of AI models to amplify the capabilities of security pr…☆68May 19, 2024Updated last year
- Cybersecurity AI (CAI), the framework for AI Security☆7,349Jan 30, 2026Updated last month
- 为初学者开发的爆破靶场。☆29Nov 28, 2025Updated 3 months ago
- ☆90Feb 28, 2026Updated last week
- Engineering Blog article prototypes☆17Oct 12, 2025Updated 4 months ago
- Runtime enforcement of software supply chain capabilities in Go☆19Nov 12, 2025Updated 3 months ago
- A curated collection of security tools, frameworks, and resources for Enumeration, Cloud Security, Static Analysis, Threat Intelligence, …☆21Dec 2, 2025Updated 3 months ago
- Rigorously evaluating autonomous systems for cybersecurity at scale☆30Jul 9, 2025Updated 8 months ago
- An AI-powered plugin for Caldera that orchestrates long-running LLM workflows to automatically create adversary emulation abilities and p…☆22Feb 2, 2026Updated last month
- AIxCC: automated vulnerability repair via LLMs, search, and static analysis☆11Jul 16, 2024Updated last year
- Lastest Hashcat rules for password cracking☆67Feb 7, 2026Updated last month
- LLM agent solving traces, leaderboards, and benchmark results across security CTF and hacking platforms☆48Updated this week
- using ML models for red teaming☆42Aug 9, 2023Updated 2 years ago
- Run a windows process with many inputs and catch exit codes☆14Jan 5, 2016Updated 10 years ago
- Scan and categorize websites for rapid triage☆12Jun 23, 2022Updated 3 years ago
- This project is an AI-powered Security Information and Event Management (SIEM) system designed for real-time threat detection and respons…☆20Nov 10, 2024Updated last year
- Agent-Driven Software Development Lifecycle (AD-SDLC) system built with Claude Agent SDK☆30Updated this week
- Dave Stewart's personal website (Feb 2021 - Jan 2026)☆10Jan 26, 2026Updated last month
- POC tool to abuse windows server failover clusters☆55Aug 7, 2025Updated 7 months ago
- ExecEvasion is a lightweight execution-evasion toolkit that generates command variants designed to bypass naive filters and WAF rules by …☆49Jan 31, 2026Updated last month
- Bundle of security analysis scripts for keras tensorflow models☆16Apr 15, 2024Updated last year
- MCP Snitch is a macOS application that intercepts and monitors MCP server communications, providing security analysis, access control, an…☆93Oct 14, 2025Updated 4 months ago
- Cybersecurity Intelligent Pentesting Helper for Ethical Researcher (CIPHER). Fine tuned LLM for penetration testing guidance based on wri…☆37Dec 24, 2024Updated last year
- Implementation of USENIX'2024 paper "Racing for TLS Certificate Validation: A Hijacker’s Guide to the Android TLS Galaxy"☆20Apr 4, 2024Updated last year
- Binary Ninja plugin for restoring function names from stripped Golang binaries☆14Oct 19, 2020Updated 5 years ago
- Code Repository for: AIRTBench: Measuring Autonomous AI Red Teaming Capabilities in Language Models☆93Mar 1, 2026Updated last week
- A collection of 10 network security tools using Scapy for traffic analysis, penetration testing, and network manipulation. Ideal for cybe…☆17Oct 20, 2024Updated last year
- MODBUS Penetration Testing Framework☆11Mar 27, 2019Updated 6 years ago
- Enables an LLM to remotely & securely control a jumphost using synchronous or asynchronous GET requests.☆13Mar 14, 2025Updated 11 months ago