Showing 16 open source projects for "cybersecurity ai"

View related business solutions
  • Full-stack observability with actually useful AI | Grafana Cloud Icon
    Full-stack observability with actually useful AI | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • Earn up to 16% annual interest with Nexo. Icon
    Earn up to 16% annual interest with Nexo.

    Access competitive interest rates on your digital assets.

    Generate interest, borrow against your crypto, and trade a range of cryptocurrencies — all in one platform. Geographic restrictions, eligibility, and terms apply.
    Get started with Nexo.
  • 1
    Cybersecurity AI

    Cybersecurity AI

    Cybersecurity AI (CAI), the framework for AI Security

    CAI (Cybersecurity AI) is a lightweight open-source framework intended to help security practitioners build and deploy AI-assisted automation for defensive and offensive security workflows. The project frames itself as a practical foundation for “AI security,” focusing on turning security tasks into agentic workflows that can be composed, executed, and iterated on by practitioners.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    HackerRepo.org

    HackerRepo.org

    Collection of cybersecurity-related references, scripts, tools, code

    HackerRepo is a massive curated repository that aggregates thousands of cybersecurity, ethical hacking, and digital forensics resources into a single structured knowledge base. The project is designed as a companion learning hub for security professionals, penetration testers, and researchers who want organized access to tools, references, and training material. It spans both offensive and defensive security topics, including exploit development, threat hunting, reverse engineering, AI security, and bug bounty methodologies. ...
    Downloads: 11 This Week
    Last Update:
    See Project
  • 3
    Kheish

    Kheish

    Kheish: A multi-role LLM agent for tasks like code auditing

    Kheish is a framework designed for cybersecurity professionals to automate penetration testing tasks, providing tools to streamline security assessments.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 4
    PentAGI

    PentAGI

    Perform penetration testing tasks

    ...It leverages agent-based architecture and AI reasoning to chain together tools and strategies in a way that mimics experienced human testers. The project is built to be modular and extensible so researchers and red teams can customize behavior or integrate additional tools as needed. By focusing on autonomous decision-making in cybersecurity contexts, PentAGI represents part of the broader trend toward AI-assisted offensive security automation.
    Downloads: 4 This Week
    Last Update:
    See Project
  • Go from Code to Production URL in Seconds Icon
    Go from Code to Production URL in Seconds

    Cloud Run deploys apps in any language instantly. Scales to zero. Pay only when code runs.

    Skip the Kubernetes configs. Cloud Run handles HTTPS, scaling, and infrastructure automatically. Two million requests free per month.
    Try it free
  • 5
    V3SP3R

    V3SP3R

    AI Flipper control

    V3SP3R is an experimental open-source project focused on integrating artificial intelligence with Flipper Zero control, aiming to create a more autonomous and intelligent interaction layer for hardware-based security tools. The project explores the concept of AI-assisted device control, where an intelligent system can interpret commands, automate workflows, and potentially orchestrate complex sequences of actions across Flipper functionalities. It is part of a broader ecosystem of projects...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 6
    RedAmon

    RedAmon

    AI-powered framework for automated penetration testing and red teaming

    RedAmon is an AI-powered red team framework designed to automate offensive cybersecurity operations from reconnaissance to exploitation and post-exploitation. It combines artificial intelligence with traditional penetration testing tools to create a fully autonomous pipeline capable of discovering vulnerabilities and executing security assessments without human intervention.
    Downloads: 15 This Week
    Last Update:
    See Project
  • 7
    MCP ZoomEye

    MCP ZoomEye

    A Model Context Protocol server that provides network asset info

    The ZoomEye MCP Server is a Model Context Protocol server that provides network asset information based on query conditions, allowing Large Language Models to obtain data by querying ZoomEye using dorks and other search parameters. ​
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Beelzebub

    Beelzebub

    A secure low code honeypot framework

    ...By using AI models to simulate realistic system behavior, the honeypot becomes harder for attackers to identify, increasing the likelihood that malicious activity can be observed and analyzed. The framework is designed with a low-code configuration approach so security teams can easily deploy honeypots for multiple services and ports.
    Downloads: 7 This Week
    Last Update:
    See Project
  • 9
    Greenplum Database

    Greenplum Database

    Massive parallel data platform for analytics, machine learning and AI

    Rapidly create and deploy models for complex applications in cybersecurity, predictive maintenance, risk management, fraud detection, and many other areas. With its unique cost-based query optimizer designed for large-scale data workloads, Greenplum scales interactive and batch-mode analytics to large datasets in the petabytes without degrading query performance and throughput. Based on PostgreSQL, Greenplum provides you with more control over the software you deploy, reducing vendor...
    Downloads: 20 This Week
    Last Update:
    See Project
  • $300 in Free Credit Towards Top Cloud Services Icon
    $300 in Free Credit Towards Top Cloud Services

    Build VMs, containers, AI, databases, storage—all in one place.

    Start your project in minutes. After credits run out, 20+ products include free monthly usage. Only pay when you're ready to scale.
    Get Started
  • 10
    vidurOS

    vidurOS

    An ultra-light Linux distro built for cybersecurity, AI/ML work

    🚀 Introducing VidurOS — A Custom Linux Distro for Cybersecurity, Programming & AI/ML After weeks of deep customization, testing, and design, I’m excited to announce the launch of VidurOS 🎉 🔥 What is VidurOS? A lightweight, blazing-fast Linux distribution built from Ubuntu Server 22.04 — optimized for: • 🛡️ Cybersecurity Tools (Nmap, Wireshark, Metasploit & more) • 💻 Programmers & Devs (Python, Node.js, C/C++, Git, Vim) • 🧠 AI/ML Enthusiasts (Jupyter, pip, SciPy preloaded — with TensorFlow/PyTorch optional) • 💾 Old PCs & VMs (XFCE-based, ISO size ~1.7 GB) 🌟 Built using Cubic, with custom theming, a responsive UI/UX, and designed to revive low-spec hardware...
    Downloads: 8 This Week
    Last Update:
    See Project
  • 11
    Purple Llama

    Purple Llama

    Set of tools to assess and improve LLM security

    Purple Llama is an umbrella safety initiative that aggregates tools, benchmarks, and mitigations to help developers build responsibly with open generative AI. Its scope spans input and output safeguards, cybersecurity-focused evaluations, and reference shields that can be inserted at inference time. The project evolves as a hub for safety research artifacts like Llama Guard and Code Shield, along with dataset specs and how-to guides for integrating checks into applications. CyberSecEval, one of its flagship components, provides repeatable evaluations for security risk, including agent-oriented tasks such as automated patching benchmarks. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    UTMStack

    UTMStack

    Customizable SIEM and XDR powered by Real-Time correlation

    Welcome to the UTMStack open-source project! UTMStack is a unified threat management platform that merges SIEM (Security Information and Event Management) and XDR (Extended Detection and Response) technologies. Our unique approach allows real-time correlation of log data, threat intelligence, and malware activity patterns from multiple sources, enabling the identification and halting of complex threats that use stealthy techniques. UTMStack stands out in threat prevention by surpassing the...
    Downloads: 8 This Week
    Last Update:
    See Project
  • 13
    VIPER

    VIPER

    AI-powered red team platform for adversary simulation toolkit

    Viper is a comprehensive red teaming and adversary simulation platform designed to support cybersecurity professionals in conducting advanced security assessments. It integrates a wide range of tools and capabilities required for penetration testing, post-exploitation, and attack simulation workflows into a unified environment. Viper emphasizes ease of use through a graphical interface, allowing users to manage complex operations without relying solely on command-line tools. It includes a...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 14
    JakiKaliOS

    JakiKaliOS

    JakiKaliOS V.0.01 is a LiveRAM Debian distribution based on Kali Linux

    ...In addition to Kali tools, JakiKaliOS ships with custom DarkHub community utilities including JakiScanner, JakiSnippets, JakiMonitor (Conky-based system monitor), Gemini-Py AI client, and stress testing scripts.
    Leader badge
    Downloads: 9 This Week
    Last Update:
    See Project
  • 15
    SecurityInfinity Cybersecurity

    SecurityInfinity Cybersecurity

    Secure your website in 10 minutes in one click.

    Secure your website in 10 minutes in one click. AI enabled cybersecurity suite for vulnerability assessment and realtime analytics. Assess your website, cloud platform and identify vulnerabilities now.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    AI-for-Security-Learning

    AI-for-Security-Learning

    AI-based security algorithms, and security data analysis

    ...The materials help learners understand how AI can analyze large volumes of security data to identify patterns that may indicate malicious activity. In addition to demonstrating defensive applications, the repository also explores adversarial machine learning concepts that highlight potential vulnerabilities in AI systems. This dual focus allows readers to study both how AI can improve cybersecurity and how machine learning models themselves can become targets of attacks.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB