Skip to content

πŸ”’ [WIP] AI Cybersecurity Models (OWASP Top 10 + CVSS) | Perfect for security teams, AI practitioners, and decision-makers looking to understand how AI can be business ready and modernized their cyber defenses. | Build & deploy AI security models | Designed with non-technical stakeholders in mind

Notifications You must be signed in to change notification settings

ThiagoMaria-SecurityIT/cybersecurity-ai-demo

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

52 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

Python Linux macOS Windows
Deepseek
LinkedIn Hugging Face Sponsor

AI for Cybersecurity Demo - Under Development

Security in Progress
Just as ISO/IEC CD 27091 and DIS 27090 are under development, these AI models continuously adapt to new threats

Warning

  • This repo is under development and are not for production
  • Please, consider the .gif file (detection_example.gif) has annotations inside and are not a real image file
  • Not recommended download this repo until finished (feel free to download but it's not 100% working and may have bugs)
  • This repo was changed to public today July 14, 2025
  • This repo is public so I can use online tools to make it better

Caution

  • UNDER DEVELOPMENT - Created July 14, 2025
  • ISO/IEC CD 27091 and ISO/IEC DIS 27090 are both under development too
  • This repo and ISO security standards share one truth: cybersecurity requires constant evolution

Transparency:

  • Made with the help of AI

πŸ”’ AI-Powered Cybersecurity Solutions (OWASP Top 10 + CVSS Framework)

🚧 Under Active Development - Created: July 14, 2025 🚧

This repository demonstrates practical AI applications for cybersecurity, focusing on OWASP Top 10 vulnerabilities and CVSS risk scoring.
You will not find an AI model that creates a complete CVSS risk scoring here because this repo was designed with non-technical stakeholders in mind, it helps:

β€’ Build enterprise-ready AI security models
β€’ Translate technical risks into business insights
β€’ Implement defensive AI strategies with clear ROI
β€’ Designed to be easy to explain how AI works in Security Information and Cybersecurity fields

Perfect for security teams, AI practitioners, and decision-makers looking to modernize their cyber defenses.

This repository demonstrates how AI can detect security threats using:

  • OWASP Top 10 (Common web attacks)
  • CVSS 4.0 (Scoring system for vulnerabilities)
  graph TD
    A[1_owasp_classifier.py] -->|Generates Model| C[3_live_detection.py]
    B[2_cvss_predictor.py] -->|Generates Model| C
    C --> D[assets/detection_example.gif]  
Loading

What This Shows

  • πŸ›‘οΈ How AI learns patterns in cyber threats
  • βš™οΈ Basic model training process
  • πŸ” Real-time detection examples

πŸš€ One-Click Setup

Get started in seconds with an automated setup scripts for all major platforms:

Script Platform What It Does
setup.ps1 Windows (PowerShell) 1. Creates virtual environment
2. Installs dependencies
3. Verifies installation
setup.bat Windows (CMD) Simple double-click executable for non-technical users
setup.sh Linux/Mac Configures everything with terminal commands

πŸ§ͺ Validation Test

After setup, verify everything works:

python test_install.py

How to use:

  1. PowerShell: Right-click β†’ "Run with PowerShell"

  2. CMD: Double-click setup.bat

  3. Linux/Mac: Run in terminal:

    chmod +x setup.sh && ./setup.sh  

Windows Users

  • PowerShell (Recommended):
    Right-click on setup.ps1 and select "Run with PowerShell"

    Set-ExecutionPolicy -Scope Process -ExecutionPolicy Bypass
    .\setup.ps1
  • Command Prompt (CMD):
    Simply double-click setup.bat

Mac/Linux Users

Run in terminal:

chmod +x setup.sh && ./setup.sh

πŸ“Œ What these scripts do:

  1. Create isolated Python environment
  2. Install all required packages
  3. Verify successful installation
  4. Show how to run the demo

πŸ”’ Safety Features:

  • No admin rights required
  • Doesn't modify system Python
  • Includes dependency verification

βœ… Guaranteed isolation – Installs everything in a self-contained virtual environment.


Try It Yourself

python examples/1_owasp_classifier.py

AI in Cybersecurity

  • This mimics how SOC analysts train systems to detect:

    • Injection attacks (OWASP #1 risk)
    • Vulnerability severity (CVSS scores)
  • Real-world systems process millions of such samples daily

    Skills Demonstrated

  • Model Training: βœ”οΈ

  • Security Knowledge: βœ”οΈ

  • Production Readiness: βœ”οΈ

About the Author

Thiago Maria - From Brazil to the World 🌎
Senior Security Information Professional | Passionate Programmer | AI Developer

With a professional background in security analysis and a deep passion for programming, I created this Github acc to share some knowledge about security information, cybersecurity, Python and AI development practices. Most of my work here focuses on implementing security-first approaches in developer tools while maintaining usability.

Click to Connect:

LinkedIn
Hugging Face

Ways to Contribute:

Want to see more upgrades? Help me keep it updated!
Sponsor

About

πŸ”’ [WIP] AI Cybersecurity Models (OWASP Top 10 + CVSS) | Perfect for security teams, AI practitioners, and decision-makers looking to understand how AI can be business ready and modernized their cyber defenses. | Build & deploy AI security models | Designed with non-technical stakeholders in mind

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published