Security in Progress
Just as ISO/IEC CD 27091 and DIS 27090 are under development, these AI models continuously adapt to new threats
Warning
- This repo is under development and are not for production
- Please, consider the .gif file (detection_example.gif) has annotations inside and are not a real image file
- Not recommended download this repo until finished (feel free to download but it's not 100% working and may have bugs)
- This repo was changed to public today July 14, 2025
- This repo is public so I can use online tools to make it better
Caution
- UNDER DEVELOPMENT - Created July 14, 2025
- ISO/IEC CD 27091 and ISO/IEC DIS 27090 are both under development too
- This repo and ISO security standards share one truth: cybersecurity requires constant evolution
- Made with the help of AI
π§ Under Active Development - Created: July 14, 2025 π§
This repository demonstrates practical AI applications for cybersecurity, focusing on OWASP Top 10 vulnerabilities and CVSS risk scoring.
You will not find an AI model that creates a complete CVSS risk scoring here because this repo was designed with non-technical stakeholders in mind, it helps:
β’ Build enterprise-ready AI security models
β’ Translate technical risks into business insights
β’ Implement defensive AI strategies with clear ROI
β’ Designed to be easy to explain how AI works in Security Information and Cybersecurity fields
Perfect for security teams, AI practitioners, and decision-makers looking to modernize their cyber defenses.
- OWASP Top 10 (Common web attacks)
- CVSS 4.0 (Scoring system for vulnerabilities)
graph TD
A[1_owasp_classifier.py] -->|Generates Model| C[3_live_detection.py]
B[2_cvss_predictor.py] -->|Generates Model| C
C --> D[assets/detection_example.gif]
- π‘οΈ How AI learns patterns in cyber threats
- βοΈ Basic model training process
- π Real-time detection examples
Get started in seconds with an automated setup scripts for all major platforms:
| Script | Platform | What It Does |
|---|---|---|
setup.ps1 |
Windows (PowerShell) | 1. Creates virtual environment 2. Installs dependencies 3. Verifies installation |
setup.bat |
Windows (CMD) | Simple double-click executable for non-technical users |
setup.sh |
Linux/Mac | Configures everything with terminal commands |
After setup, verify everything works:
python test_install.pyHow to use:
-
PowerShell: Right-click β "Run with PowerShell"
-
CMD: Double-click
setup.bat -
Linux/Mac: Run in terminal:
chmod +x setup.sh && ./setup.sh
-
PowerShell (Recommended):
Right-click onsetup.ps1and select "Run with PowerShell"Set-ExecutionPolicy -Scope Process -ExecutionPolicy Bypass .\setup.ps1
-
Command Prompt (CMD):
Simply double-clicksetup.bat
Run in terminal:
chmod +x setup.sh && ./setup.shπ What these scripts do:
- Create isolated Python environment
- Install all required packages
- Verify successful installation
- Show how to run the demo
π Safety Features:
- No admin rights required
- Doesn't modify system Python
- Includes dependency verification
β Guaranteed isolation β Installs everything in a self-contained virtual environment.
python examples/1_owasp_classifier.py-
This mimics how SOC analysts train systems to detect:
- Injection attacks (OWASP #1 risk)
- Vulnerability severity (CVSS scores)
-
Real-world systems process millions of such samples daily
-
Model Training: βοΈ
-
Security Knowledge: βοΈ
-
Production Readiness: βοΈ
Thiago Maria - From Brazil to the World π
Senior Security Information Professional | Passionate Programmer | AI Developer
With a professional background in security analysis and a deep passion for programming, I created this Github acc to share some knowledge about security information, cybersecurity, Python and AI development practices. Most of my work here focuses on implementing security-first approaches in developer tools while maintaining usability.
Click to Connect: