

CybGPT - Cyber Security - Cybersecurity
0
0
About CybGPT - Cyber Security - Cybersecurity
Your Cybersecurity Assistant - Collaborate https://github.com/Coinnect-SA/CybGPT
June 02,2024
Information
- GPTs Creator Coinnect SA
- Categories Research
- GPT Updated June 02,2024
- Updated June 03,2024
Capabilities
- DALLE•E ✓Image Creation
- Browsing ✓Real-Time Retrieval
- Code Interpreter ✓Data Analysis
Share recipient
- OpenAI‘s GPT Store Public
Timeline

CybGPT - Cyber Security - Cybersecurity
By Coinnect SA
CybGPT - Cyber Security - Cybersecurity is inactive right now!
4.3
Ratings (449)
Research
Category
10K+
Conversations
Try Alternatives
Can you perform an attack surface analysis?
Can you check stolen credentials of a email address?
Can you do a cyber business impact analysis?
Can you analyze an IP address?
Can you share updated stats about ransomware attacks?
Message ChatGPT
What Can CybGPT - Cyber Security - Cybersecurity Do with ChatGPT?
This Gpts for individuals and businesses can do a wide range of cybersecurity tasks.
1. Function Calls
Field | Value |
---|---|
action_id | g-df998677cddd4348c3ce9cc3f2301fd9fba97906 |
domain | api.cybgpt.net |
json_schema | {"openapi"=>"3.0.0", "info"=>{"title"=>"Cybersecurity API", "version"=>"1.0.0", "description"=>"An API for performing various tasks related to cybersecurity for a company or individual."}, "servers"=>[{"url"=>"https://api.cybgpt.net/api/v1"}], "paths"=>{"/checkEmailCredentials/{email}"=>{"get"=>{"description"=>"Request a check on a email address for stolen credential in the last year. A operation code will be sent on the user email to start the scansion.", "summary"=>"Request a check on a email address for stolen credential", "operationId"=>"checkEmailCredentials", "parameters"=>[{"name"=>"email", "in"=>"path", "required"=>true, "description"=>"The user must insert a email address. The email must be a valid email address. A operation code will be sent on this email.", "schema"=>{"type"=>"string"}, "example"=>"[email protected]"}], "responses"=>{"200"=>{"description"=>"A operation code will be sent on the email address provided."}, "400"=>{"description"=>"The email must be a valid email address."}, "401"=>{"description"=>"Unauthorized"}, "500"=>{"description"=>"Internal server error"}}}}, "/doOperation/{operationCode}"=>{"get"=>{"description"=>"When the user provides the operation code he received by email, the system will start the operation and return the result. The result depends on the operation type he requested previously.", "summary"=>"Start the operation requested by the user.", "operationId"=>"doOperation", "parameters"=>[{"name"=>"operationCode", "in"=>"path", "required"=>true, "description"=>"The operation code to start the operation. The code is always a string of 6 characters.", "schema"=>{"type"=>"string"}, "example"=>"123abc"}], "responses"=>{"200"=>{"description"=>"Success", "content"=>{"application/json"=>{"schema"=>{"oneOf"=>[{"$ref"=>"#/components/schemas/checkEmailCredentialsResponse"}, {"$ref"=>"#/components/schemas/scanCompanyResponse"}]}}}}, "404"=>{"description"=>"The operation code is not valid."}, "500"=>{"description"=>"Internal server error"}}}}, "/getBusinessImpact/{domain}"=>{"get"=>{"description"=>"Request to write the business impact on a company if it is attacked by a cyber attack. The result is a raw text extracted from the company website where find information to write the business impact.", "summary"=>"Request to write the business impact on a company if it is attacked by a cyber attack.", "operationId"=>"getBusinessImpact", "parameters"=>[{"name"=>"domain", "in"=>"path", "required"=>true, "description"=>"The domain of the company. The domain must be a valid domain.", "schema"=>{"type"=>"string"}, "example"=>"example.com"}], "responses"=>{"200"=>{"description"=>"OK", "content"=>{"application/json"=>{"schema"=>{"type"=>"object", "properties"=>{"rawPages"=>{"type"=>"string", "description"=>"Raw text extracted from a company's website to be used for writing the business impact."}}}}}}, "400"=>{"description"=>"The domain must be a valid domain address for example company.com"}, "500"=>{"description"=>"Internal server error"}}}}, "/getIP/{ip}"=>{"get"=>{"description"=>"Performs a scan of the given IP address. IP address must be a internet public address. The result is a list of findings and technologies found on the IP address.", "summary"=>"Scans the IP address", "operationId"=>"scanIP", "parameters"=>[{"name"=>"ip", "in"=>"path", "required"=>true, "description"=>"The IP address to scan. IP address must be a internet public address.", "schema"=>{"type"=>"string"}, "example"=>"8.8.8.8"}], "responses"=>{"200"=>{"description"=>"Successful scan", "content"=>{"application/json"=>{"schema"=>{"type"=>"object", "properties"=>{"message"=>{"type"=>"string", "description"=>"A message to inform the user about the result of the scan."}, "ip_address"=>{"type"=>"string", "description"=>"The IP address that was scanned."}, "created"=>{"type"=>"number", "description"=>"The unix timestamp when the ip was first scanned."}, "updated"=>{"type"=>"number", "description"=>"The unix timestamp when the ip was last updated."}, "cloud"=>{"type"=>"string", "description"=>"If present, it states that this is an ip adress belonging to a clound and who is the provider."}, "score_data"=>{"type"=>"object", "properties"=>{"final_ip_score"=>{"type"=>"number", "description"=>"The risk score associated to the IP, from 0 to 100, where 0 is safe and 100 is danger."}, "normalized_ip_score_detailed"=>{"type"=>"object", "properties"=>{"storage"=>{"type"=>"number", "description"=>"The risk score associated to the IP and related to storage, from 0 to 100, where 100 is the highest risk."}, "rms"=>{"type"=>"number", "description"=>"The risk score associated to the IP and related to remote management, from 0 to 100, where 100 is the highest risk."}, "cve"=>{"type"=>"number", "description"=>"The risk score associated to the IP and related to vulnerabilities, from 0 to 100, where 100 is the highest risk."}, "encryption"=>{"type"=>"number", "description"=>"The risk score associated to the IP and related to encryption, from 0 to 100, where 100 is the highest risk."}, "attack_surface"=>{"type"=>"number", "description"=>"The risk score associated to the IP and related to the attack surface, from 0 to 100, where 100 is the highest risk."}, "web"=>{"type"=>"number", "description"=>"The risk score associated to the IP and related to web technologies, from 0 to 100, where 100 is the highest risk."}, "critical_cve"=>{"type"=>"number", "description"=>"The risk score associated to the IP and related to critical vulnerabilities, from 0 to 100, where 100 is the highest risk."}, "panels"=>{"type"=>"number", "description"=>"The risk score associated to the IP and related to administratoive and access panels, from 0 to 100, where 100 is the highest risk."}}}, "ip_score_detailed"=>{"type"=>"object", "properties"=>{"storage"=>{"type"=>"number", "description"=>"The risk score associated to the IP and related to storage, the higher the number, the higher the risk."}, "rms"=>{"type"=>"number", "description"=>"The risk score associated to the IP and related to remote management, the higher the number, the higher the risk."}, "cve"=>{"type"=>"number", "description"=>"The risk score associated to the IP and related to vulnerabilities, the higher the number, the higher the risk."}, "encryption"=>{"type"=>"number", "description"=>"The risk score associated to the IP and related to encryption, the higher the number, the higher the risk."}, "attack_surface"=>{"type"=>"number", "description"=>"The risk score associated to the IP and related to the attack surface, the higher the number, the higher the risk."}, "web"=>{"type"=>"number", "description"=>"The risk score associated to the IP and related to web technologies, the higher the number, the higher the risk."}, "critical_cve"=>{"type"=>"number", "description"=>"The risk score associated to the IP and related to critical vulnerabilities, the higher the number, the higher the risk."}, "panels"=>{"type"=>"number", "description"=>"The risk score associated to the IP and related to administratoive and access panels, the higher the number, the higher the risk."}}}}}, "geo_ip"=>{"type"=>"object", "properties"=>{"country_name"=>{"type"=>"string", "description"=>"The name of the country the IP is from."}, "latitude"=>{"type"=>"number", "description"=>"The latitude coordinated of where the IP adress is located."}, "longitude"=>{"type"=>"number", "description"=>"The longitude coordinated of where the IP adress is located."}}}, "findings"=>{"type"=>"object", "properties"=>{"port"=>{"type"=>"number", "description"=>"The port on the IP address."}, "description"=>{"type"=>"string", "description"=>"The brief description of the finding."}, "risk"=>{"type"=>"string", "description"=>"A description of the cybersecurity risk of the finding."}, "recommendation"=>{"type"=>"array", "description"=>"A list of reccomendations to mitigate or resolve the finding.", "items"=>{"type"=>"string", "description"=>"A single recommendation to mitigate and resolve the finding."}}, "level"=>{"type"=>"string", "description"=>"The risk level experessed in textual form, possible levels are: LOW, MODERATE, HIGH, CRITICAL"}, "risk_score"=>{"type"=>"number", "description"=>"The risk level expressed in a numerical value from 0 lowest to 10 highest."}, "epss"=>{"type"=>"number", "description"=>"If present, it indicates the likelihood of a vulnerability to be exploited from 0 to 100, where 100 is the most likely to be exploited."}}}, "techs"=>{"type"=>"object", "properties"=>{"port"=>{"type"=>"number", "description"=>"The port on the IP address where the technology was found."}, "tech_name"=>{"type"=>"string", "description"=>"The name of the technology or product found."}, "version"=>{"type"=>"string", "description"=>"The version of the technology or product found."}, "cves"=>{"type"=>"array", "description"=>"A list of vulnerabilities associated with the technology.", "items"=>{"type"=>"string", "description"=>"The vulnerability code as defined in the CVE (Common Vulnerabilities and Exposures) framework."}}, "category"=>{"type"=>"array", "description"=>"A list of categories belonging to the technology.", "items"=>{"type"=>"string", "description"=>"The category name."}}}}}}}}}, "400"=>{"description"=>"Bad request"}, "401"=>{"description"=>"Unauthorized"}, "404"=>{"description"=>"We could not find the IP, we could not scan the IP"}, "500"=>{"description"=>"Internal server error"}}}}, "/getRansomwareStats"=>{"get"=>{"description"=>"Get number of attacked companies by double extortion ransomware attacks. The data may be filtered by ransomware groups, date range and company sector, country code, revenue, number of employees. All the parameters are optional. Inform the user that he can insert only a subset of the parameters", "summary"=>"Get number of attacked companies", "operationId"=>"getRansomwareStats", "parameters"=>[{"name"=>"naicsCode", "in"=>"query", "description"=>"The sector of the company. If not provided, the statistics will be for the whole sectors. Traslate the user input in a valid NAICS code.", "schema"=>{"type"=>"integer"}}, {"name"=>"countryCode", "in"=>"query", "description"=>"The country code of the country to get ransomware statistics for. If not provided, the statistics will be for the whole world.If provided trasform the country in its country code.", "schema"=>{"type"=>"string"}}, {"name"=>"revenue", "in"=>"query", "description"=>"The revenue of the country in USD. If not provided, the statistics will be for the whole revenues.", "schema"=>{"type"=>"number"}}, {"name"=>"employees", "in"=>"query", "description"=>"The number of employees of the company. If not provided, the statistics will be for the whole number of employees.", "schema"=>{"type"=>"number"}}, {"name"=>"ransomwareGroup", "in"=>"query", "description"=>"The name of the ransomware group. If not provided, the statistics will be for the whole ransomware groups.", "schema"=>{"type"=>"string"}}, {"name"=>"startDate", "in"=>"query", "description"=>"The start date of the period of interest. If not provided, the statistics will be from the beginning.", "schema"=>{"type"=>"string"}}, {"name"=>"endDate", "in"=>"query", "description"=>"The end date of the period of interest. If not provided, the statistics will be until today.", "schema"=>{"type"=>"string"}}], "responses"=>{"200"=>{"description"=>"Successful scan", "content"=>{"application/json"=>{"schema"=>{"type"=>"object", "properties"=>{"attackedCompanies"=>{"type"=>"number", "description"=>"Number of attacked companies"}}}}}}, "400"=>{"description"=>"Bad request"}, "401"=>{"description"=>"Unauthorized"}, "500"=>{"description"=>"Internal server error"}}}}, "/scanCompany"=>{"get"=>{"description"=>"Request an analysis on the company attack surface searching for issues and vulnarabilieties. A operation code will be sent on the user email to start the scansion.", "summary"=>"Request a scan on the company external surface searching for issues and vulnarabilieties.", "operationId"=>"scanCompany", "parameters"=>[{"name"=>"userEmail", "in"=>"query", "required"=>true, "description"=>"The user must insert a email address. The email must be valid and a business email address, not gmail, outlook or other generic email providers. A operation code will be sent on this email.", "schema"=>{"type"=>"string"}}], "responses"=>{"200"=>{"description"=>"OK", "content"=>{"application/json"=>{"schema"=>{"type"=>"object", "properties"=>{"operationResult"=>{"type"=>"string", "description"=>"A description for the user about the operation result. Inform the user about the result."}}}}}}, "400"=>{"description"=>"Bad request"}, "401"=>{"description"=>"Unauthorized"}, "500"=>{"description"=>"Internal server error"}}}}}, "components"=>{"schemas"=>{"checkEmailCredentialsResponse"=>{"type"=>"array", "items"=>{"type"=>"object", "properties"=>{"email"=>{"type"=>"string", "description"=>"The email address for the stolen credential."}, "username"=>{"type"=>"string", "description"=>"The username for the stolen credential."}, "passwordHidden"=>{"type"=>"string", "description"=>"The password the stolen credential. Only the first and the last charachter is visible."}, "source"=>{"type"=>"string", "description"=>"The name of the catalog where the credential was found. "}, "publish_date"=>{"type"=>"string", "description"=>"The date when the credential was found."}, "nationIdHidden"=>{"type"=>"string", "description"=>"The stolen number of a persons national ID card. Only the last 3 characters are visible"}, "passportNumberHidden"=>{"type"=>"string", "description"=>"The stolen number of a persons passport. Only the last 3 characters are visible"}, "phoneHidden"=>{"type"=>"string", "description"=>"The stolen phone number of a person. Only the last 3 characters are visible"}, "cc_expiration"=>{"type"=>"string", "description"=>"The stolen expiration date of a persons credit card."}, "ccNumberHidden"=>{"type"=>"number", "description"=>"The stolen number of a persons credit card. Only the last 3 characters are visible"}, "infected_machine_id"=>{"type"=>"string", "description"=>"The id of the machine that was infected."}, "infected_time"=>{"type"=>"string", "description"=>"The time when the machine became infected."}, "target_url"=>{"type"=>"string", "description"=>"The url that the user visited when the credentials were stolen."}, "user_os"=>{"type"=>"string", "description"=>"The operating system of the user infected machine."}}}}, "scanCompanyResponse"=>{"type"=>"object", "properties"=>{"result"=>{"type"=>"string", "description"=>"Information to the user about the result of the operation."}}}}}} |
auth | {"type":"service_http","instructions":"","authorization_type":"custom","verification_tokens":{},"custom_auth_header":"X-API-KEY"} |
privacy_policy_url | https://www.coinnect.com/about/privacy |
Capabilitiy | Function | Tools |
---|---|---|
DALLE•E | Generate unique images based on textual descriptions provided. | Dalle |
Web Browsing | Real-Time Access and search the internet for information, articles, and data. | Browser |
Code Interpreter / Data Analysis | Execute Python code for automation, calculations, and data analysis. | Python |
CybGPT - Cyber Security - Cybersecurity reviews
Similar GPTs

A concise guide to current cyber security concerns and the latest online scams, focusing on how individuals and businesses can recognize and protect themselves from these evolving digital threats.
10

CybersecurityGPT
by madewithai.euDein persönlicher Experte für Systemsicherheit und Ethical Hacking
30

CyberSecurityGPT
by JOSEPH ARNAUD WIEHEConversational cybersecurity expert based on industry best practices and The Book On Cybersecurity
30