Showing 9 open source projects for "cybersecurity ai"

View related business solutions
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build generative AI apps with Vertex AI. Switch between models without switching platforms.
    Start Free
  • Earn up to 16% annual interest with Nexo. Icon
    Earn up to 16% annual interest with Nexo.

    Access competitive interest rates on your digital assets.

    Generate interest, borrow against your crypto, and trade a range of cryptocurrencies — all in one platform. Geographic restrictions, eligibility, and terms apply.
    Get started with Nexo.
  • 1
    Cybersecurity AI

    Cybersecurity AI

    Cybersecurity AI (CAI), the framework for AI Security

    CAI (Cybersecurity AI) is a lightweight open-source framework intended to help security practitioners build and deploy AI-assisted automation for defensive and offensive security workflows. The project frames itself as a practical foundation for “AI security,” focusing on turning security tasks into agentic workflows that can be composed, executed, and iterated on by practitioners.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    HackerRepo.org

    HackerRepo.org

    Collection of cybersecurity-related references, scripts, tools, code

    HackerRepo is a massive curated repository that aggregates thousands of cybersecurity, ethical hacking, and digital forensics resources into a single structured knowledge base. The project is designed as a companion learning hub for security professionals, penetration testers, and researchers who want organized access to tools, references, and training material. It spans both offensive and defensive security topics, including exploit development, threat hunting, reverse engineering, AI security, and bug bounty methodologies. ...
    Downloads: 13 This Week
    Last Update:
    See Project
  • 3
    Kheish

    Kheish

    Kheish: A multi-role LLM agent for tasks like code auditing

    Kheish is a framework designed for cybersecurity professionals to automate penetration testing tasks, providing tools to streamline security assessments.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 4
    PentAGI

    PentAGI

    Perform penetration testing tasks

    ...It leverages agent-based architecture and AI reasoning to chain together tools and strategies in a way that mimics experienced human testers. The project is built to be modular and extensible so researchers and red teams can customize behavior or integrate additional tools as needed. By focusing on autonomous decision-making in cybersecurity contexts, PentAGI represents part of the broader trend toward AI-assisted offensive security automation.
    Downloads: 3 This Week
    Last Update:
    See Project
  • Fully Managed MySQL, PostgreSQL, and SQL Server Icon
    Fully Managed MySQL, PostgreSQL, and SQL Server

    Automatic backups, patching, replication, and failover. Focus on your app, not your database.

    Cloud SQL handles your database ops end to end, so you can focus on your app.
    Try Free
  • 5
    MCP ZoomEye

    MCP ZoomEye

    A Model Context Protocol server that provides network asset info

    The ZoomEye MCP Server is a Model Context Protocol server that provides network asset information based on query conditions, allowing Large Language Models to obtain data by querying ZoomEye using dorks and other search parameters. ​
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Beelzebub

    Beelzebub

    A secure low code honeypot framework

    ...By using AI models to simulate realistic system behavior, the honeypot becomes harder for attackers to identify, increasing the likelihood that malicious activity can be observed and analyzed. The framework is designed with a low-code configuration approach so security teams can easily deploy honeypots for multiple services and ports.
    Downloads: 8 This Week
    Last Update:
    See Project
  • 7
    Purple Llama

    Purple Llama

    Set of tools to assess and improve LLM security

    Purple Llama is an umbrella safety initiative that aggregates tools, benchmarks, and mitigations to help developers build responsibly with open generative AI. Its scope spans input and output safeguards, cybersecurity-focused evaluations, and reference shields that can be inserted at inference time. The project evolves as a hub for safety research artifacts like Llama Guard and Code Shield, along with dataset specs and how-to guides for integrating checks into applications. CyberSecEval, one of its flagship components, provides repeatable evaluations for security risk, including agent-oriented tasks such as automated patching benchmarks. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    VIPER

    VIPER

    AI-powered red team platform for adversary simulation toolkit

    Viper is a comprehensive red teaming and adversary simulation platform designed to support cybersecurity professionals in conducting advanced security assessments. It integrates a wide range of tools and capabilities required for penetration testing, post-exploitation, and attack simulation workflows into a unified environment. Viper emphasizes ease of use through a graphical interface, allowing users to manage complex operations without relying solely on command-line tools. It includes a...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 9
    AI-for-Security-Learning

    AI-for-Security-Learning

    AI-based security algorithms, and security data analysis

    ...The materials help learners understand how AI can analyze large volumes of security data to identify patterns that may indicate malicious activity. In addition to demonstrating defensive applications, the repository also explores adversarial machine learning concepts that highlight potential vulnerabilities in AI systems. This dual focus allows readers to study both how AI can improve cybersecurity and how machine learning models themselves can become targets of attacks.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Custom VMs From 1 to 96 vCPUs With 99.95% Uptime Icon
    Custom VMs From 1 to 96 vCPUs With 99.95% Uptime

    General-purpose, compute-optimized, or GPU/TPU-accelerated. Built to your exact specs.

    Live migration and automatic failover keep workloads online through maintenance. One free e2-micro VM every month.
    Try Free
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB