Showing 3 open source projects for "cybersecurity ai"

View related business solutions
  • $300 in Free Credit Towards Top Cloud Services Icon
    $300 in Free Credit Towards Top Cloud Services

    Build VMs, containers, AI, databases, storage—all in one place.

    Start your project in minutes. After credits run out, 20+ products include free monthly usage. Only pay when you're ready to scale.
    Get Started
  • Go From AI Idea to AI App Fast Icon
    Go From AI Idea to AI App Fast

    One platform to build, fine-tune, and deploy ML models. No MLOps team required.

    Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
    Try Free
  • 1
    PentAGI

    PentAGI

    Perform penetration testing tasks

    ...It leverages agent-based architecture and AI reasoning to chain together tools and strategies in a way that mimics experienced human testers. The project is built to be modular and extensible so researchers and red teams can customize behavior or integrate additional tools as needed. By focusing on autonomous decision-making in cybersecurity contexts, PentAGI represents part of the broader trend toward AI-assisted offensive security automation.
    Downloads: 20 This Week
    Last Update:
    See Project
  • 2
    Beelzebub

    Beelzebub

    A secure low code honeypot framework

    ...By using AI models to simulate realistic system behavior, the honeypot becomes harder for attackers to identify, increasing the likelihood that malicious activity can be observed and analyzed. The framework is designed with a low-code configuration approach so security teams can easily deploy honeypots for multiple services and ports.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 3
    UTMStack

    UTMStack

    Customizable SIEM and XDR powered by Real-Time correlation

    Welcome to the UTMStack open-source project! UTMStack is a unified threat management platform that merges SIEM (Security Information and Event Management) and XDR (Extended Detection and Response) technologies. Our unique approach allows real-time correlation of log data, threat intelligence, and malware activity patterns from multiple sources, enabling the identification and halting of complex threats that use stealthy techniques. UTMStack stands out in threat prevention by surpassing the...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB