CyberSec AI Portfolio - Datasets, Models & Spaces
80+ datasets, 35 Spaces & 4 models for cybersecurity AI: RGPD, NIS2, ISO 27001, DORA, AI Act, MITRE ATT&CK & more. By Ayi NEDJIMI.
-
Text Generation • Updated • 116 -
AYI-NEDJIMI/ISO27001-Expert-1.5B
Text Generation • Updated • 60 • 1 -
AYI-NEDJIMI/RGPD-Expert-1.5B
Text Generation • Updated • 8 • 1 -
AYI-NEDJIMI/m365-expert-v3
8B • Updated • 24 • 1 -
AD Attack Explorer
🏰Explore Active Directory attacks with searchable tables and charts
-
AD Attack Simulator
🏰Explore AD attack techniques with details and defenses
-
AD Tiering Model Builder
🏗 -
AI Act Risk Classifier
⚖ -
AI Agents & Frameworks Explorer
🤖 -
AI Code & Multimodal Explorer
🤖 -
AI Cybersecurity Explorer
🛡 -
AI Governance & Enterprise Explorer
🏛 -
Attack Path Visualizer
🗺 -
Bug Bounty & Pentesting Explorer
🛡Bug bounty methodologies, techniques, tools in FR/EN
-
Compliance Checker
✅Calculate compliance score and maturity for selected framework
-
CVE Lookup Tool
🔍 -
Cybersecurity Quiz
🎯 -
DevSecOps Pipeline Explorer
🔒Explore DevSecOps practices, tools, and pipeline templates
-
DORA Compliance Assessment
🏦 -
EDR Evasion Explorer
🛡 -
Forensics Timeline Builder
🔍 -
ISO 27001:2022 Explorer
🔒Explore ISO 27001:2022 clauses, controls and stats with search
-
KQL Threat Hunting Builder
🔎 -
LLM Fine-tuning & Quantization Explorer
🔬 -
M365 Security Scorecard
🛡 -
MITRE ATT&CK Explorer
⚔ -
MLOps & AI Infrastructure Explorer
🔧 -
Nis2 Directive Explorer
📊Explore EU NIS2 Directive articles, sectors, and stats
-
OWASP Top 10 Explorer
🌐Explore OWASP Top 10 vulnerabilities with searchable tables and charts
-
Portfolio
💻Explore cybersecurity & AI consulting services
-
Post-Quantum Crypto Planner
🔐 -
Prompt Engineering Explorer
🧠Explore prompt engineering techniques in French and English
-
RAG & LangChain Explorer
🔍 -
RGPD/GDPR Explorer
🔒Explore GDPR articles, sanctions, checklists, and stats
-
SBOM Generator & Validator
📦 -
Security Assessment Generator
📋 -
SOC Analyst & SOC 2 Explorer
🛡Explore SOC playbooks, SIEM use cases, tools, and SOC 2 controls
-
SSRF Payload Generator
🎯 -
Zero Trust Architecture Explorer
🔐Explore Zero Trust concepts and tools with interactive charts
-
AYI-NEDJIMI/ad-attacks-en
Updated • 112 • 2 -
AYI-NEDJIMI/ad-attacks-fr
Updated • 25 -
AYI-NEDJIMI/ad-tiering-model-en
Viewer • Updated • 164 • 16 -
AYI-NEDJIMI/ad-tiering-model-fr
Viewer • Updated • 164 • 18 -
AYI-NEDJIMI/ai-act-en
Preview • Updated • 50 -
AYI-NEDJIMI/ai-act-fr
Preview • Updated • 8 -
AYI-NEDJIMI/ai-agents-en
Viewer • Updated • 132 • 29 -
AYI-NEDJIMI/ai-agents-fr
Viewer • Updated • 132 • 27 -
AYI-NEDJIMI/ai-code-multimodal-en
Viewer • Updated • 112 • 62 -
AYI-NEDJIMI/ai-code-multimodal-fr
Viewer • Updated • 112 • 53 -
AYI-NEDJIMI/ai-cybersecurity-en
Viewer • Updated • 130 • 31 • 1 -
AYI-NEDJIMI/ai-cybersecurity-fr
Viewer • Updated • 130 • 21 -
AYI-NEDJIMI/ai-governance-en
Viewer • Updated • 129 • 19 -
AYI-NEDJIMI/ai-governance-fr
Viewer • Updated • 129 • 14 -
AYI-NEDJIMI/bug-bounty-pentest-en
Viewer • Updated • 146 • 108 • 2 -
AYI-NEDJIMI/bug-bounty-pentest-fr
Viewer • Updated • 146 • 52 • 1 -
AYI-NEDJIMI/cis-controls-en
Updated • 43 -
AYI-NEDJIMI/cis-controls-fr
Updated • 30 -
AYI-NEDJIMI/cloud-security-en
Updated • 29 -
AYI-NEDJIMI/cloud-security-fr
Updated • 23 -
AYI-NEDJIMI/compliance-eu-en
Updated • 10 -
AYI-NEDJIMI/compliance-eu-fr
Updated • 6 -
AYI-NEDJIMI/cve-top100-en
Updated • 14 -
AYI-NEDJIMI/cve-top100-fr
Updated • 13 -
AYI-NEDJIMI/devsecops-pipeline-en
Viewer • Updated • 130 • 11 -
AYI-NEDJIMI/devsecops-pipeline-fr
Viewer • Updated • 130 • 15 -
AYI-NEDJIMI/dora-controls-en
Viewer • Updated • 193 • 22 -
AYI-NEDJIMI/dora-controls-fr
Viewer • Updated • 193 • 19 -
AYI-NEDJIMI/edr-evasion-en
Viewer • Updated • 162 • 26 -
AYI-NEDJIMI/edr-evasion-fr
Viewer • Updated • 162 • 9 -
AYI-NEDJIMI/forensics-windows-en
Updated • 36 -
AYI-NEDJIMI/forensics-windows-fr
Updated • 18 -
AYI-NEDJIMI/gdpr-en
Viewer • Updated • 153 • 61 -
AYI-NEDJIMI/incident-response-en
Updated • 160 • 1 -
AYI-NEDJIMI/incident-response-fr
Updated • 57 • 1 -
AYI-NEDJIMI/iso27001
Updated • 29 • 1 -
AYI-NEDJIMI/iso27001-en
Updated • 43 -
AYI-NEDJIMI/k8s-security-en
Updated • 17 -
AYI-NEDJIMI/k8s-security-fr
Updated • 20 -
AYI-NEDJIMI/llm-finetuning-en
Viewer • Updated • 264 • 22 -
AYI-NEDJIMI/llm-finetuning-fr
Viewer • Updated • 264 • 18 -
AYI-NEDJIMI/llm-security-en
Viewer • Updated • 157 • 21 -
AYI-NEDJIMI/llm-security-fr
Viewer • Updated • 157 • 37 -
AYI-NEDJIMI/m365-security-en
Updated • 18 -
AYI-NEDJIMI/m365-security-fr
Updated • 20 -
AYI-NEDJIMI/mitre-attack-en
Updated • 30 -
AYI-NEDJIMI/mitre-attack-fr
Updated • 82 -
AYI-NEDJIMI/mlops-infrastructure-en
Viewer • Updated • 264 • 13 -
AYI-NEDJIMI/mlops-infrastructure-fr
Viewer • Updated • 264 • 30 -
AYI-NEDJIMI/nis2-directive-en
Viewer • Updated • 135 • 57 -
AYI-NEDJIMI/nis2-directive-fr
Viewer • Updated • 135 • 14 -
AYI-NEDJIMI/nist-csf-en
Updated • 52 -
AYI-NEDJIMI/nist-csf-fr
Updated • 15 -
AYI-NEDJIMI/oauth-api-security-en
Viewer • Updated • 145 • 14 -
AYI-NEDJIMI/oauth-api-security-fr
Viewer • Updated • 145 • 14 -
AYI-NEDJIMI/owasp-top10-en
Updated • 63 -
AYI-NEDJIMI/owasp-top10-fr
Updated • 17 -
AYI-NEDJIMI/pentest-checklist-en
Updated • 50 -
AYI-NEDJIMI/pentest-checklist-fr
Updated • 23 -
AYI-NEDJIMI/post-quantum-crypto-en
Viewer • Updated • 122 • 18 -
AYI-NEDJIMI/post-quantum-crypto-fr
Viewer • Updated • 122 • 26 -
AYI-NEDJIMI/prompt-engineering-en
Viewer • Updated • 145 • 26 -
AYI-NEDJIMI/prompt-engineering-fr
Viewer • Updated • 145 • 26 -
AYI-NEDJIMI/rag-langchain-en
Viewer • Updated • 268 • 37 -
AYI-NEDJIMI/rag-langchain-fr
Viewer • Updated • 268 • 25 -
AYI-NEDJIMI/ransomware-playbooks-en
Updated • 38 -
AYI-NEDJIMI/ransomware-playbooks-fr
Updated • 11 -
AYI-NEDJIMI/rgpd-fr
Viewer • Updated • 153 • 12 -
AYI-NEDJIMI/sbom-compliance-en
Viewer • Updated • 130 • 48 -
AYI-NEDJIMI/sbom-compliance-fr
Viewer • Updated • 130 • 35 -
AYI-NEDJIMI/security-tool-benchmarks-en
Viewer • Updated • 106 • 43 -
AYI-NEDJIMI/security-tool-benchmarks-fr
Viewer • Updated • 106 • 42 -
AYI-NEDJIMI/soc-analyst-en
Viewer • Updated • 147 • 20 -
AYI-NEDJIMI/soc-analyst-fr
Viewer • Updated • 147 • 12 -
AYI-NEDJIMI/supply-chain-attacks-en
Viewer • Updated • 151 • 19 -
AYI-NEDJIMI/supply-chain-attacks-fr
Viewer • Updated • 151 • 22 -
AYI-NEDJIMI/threat-hunting-soc-en
Viewer • Updated • 172 • 92 • 1 -
AYI-NEDJIMI/threat-hunting-soc-fr
Viewer • Updated • 172 • 28 -
AYI-NEDJIMI/zero-trust-en
Viewer • Updated • 130 • 16 -
AYI-NEDJIMI/zero-trust-fr
Viewer • Updated • 130 • 20
CyberSec Models - Advanced Demo
🛡Chat with expert cybersecurity models and get instant answers
Note Interactive demo to chat with all 3 fine-tuned cybersecurity models
CyberSec Chat RAG
🐨Note RAG chat interface over 80+ datasets
Model Playground
🎮Note Experiment with model parameters and prompts
Dataset Explorer
🔐Note Navigate and search 80 cybersecurity datasets
Compliance Assistant
🛡Note Multi-framework compliance wizard (RGPD/ISO27001/NIS2)
AYI-NEDJIMI/threat-intelligence
Updated • 20Note IoCs, TTPs, APT groups - 205 entries
AYI-NEDJIMI/incident-response-playbooks
Viewer • Updated • 35 • 35Note 35+ IR playbooks with NIST 800-61 mapping
AYI-NEDJIMI/cloud-security
Updated • 6Note AWS/Azure/GCP security best practices
AYI-NEDJIMI/kubernetes-security
Viewer • Updated • 13 • 16Note K8s security, CIS benchmarks, pod security
AYI-NEDJIMI/supply-chain-security
Preview • Updated • 19Note SBOM, SLSA, Sigstore, supply chain attacks
AYI-NEDJIMI/ISO27001-Expert-1.5B-Merged
Text Generation • 2B • UpdatedNote Standalone merged ISO27001 model
AYI-NEDJIMI/RGPD-Expert-1.5B-Merged
Text Generation • 2B • UpdatedNote Standalone merged RGPD model
AYI-NEDJIMI/CyberSec-Assistant-3B-Merged
Text Generation • 3B • Updated • 1Note Standalone merged CyberSec model
AYI-NEDJIMI/ISO27001-Expert-1.5B-GGUF
Text Generation • 2B • Updated • 54 • 1Note GGUF quantized for Ollama/llama.cpp
AYI-NEDJIMI/RGPD-Expert-1.5B-GGUF
Text Generation • 2B • Updated • 25Note GGUF quantized for Ollama/llama.cpp
AYI-NEDJIMI/CyberSec-Assistant-3B-GGUF
Text Generation • 3B • Updated • 7Note GGUF quantized for Ollama/llama.cpp
Portfolio CyberSec AI
🛡Senior Offensive Cybersecurity & AI Consultant Portfolio
Note Portfolio vitrine professionnelle
AYI-NEDJIMI/CyberSec-Bench
Viewer • Updated • 200 • 90 • 1Note Benchmark: 200 questions cybersec (FR+EN)
-
CyberSec Leaderboard
🛡CyberSec-Bench LLM Evaluation Leaderboard
-
CyberSec-API
🛡REST API gateway for CyberSec AI models