☆42Feb 18, 2026Updated 2 months ago
Alternatives and similar repositories for SEevenLLM
Users that are interested in SEevenLLM are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A labeled dataset used for the knowledge graph construction.☆34Nov 30, 2023Updated 2 years ago
- ☆10Jan 21, 2019Updated 7 years ago
- RENet is a deep learning tensorflow2.0 model for classify ATT&CK techniques and tactics for cyber threat intelligence with relevance enha…☆12Jan 11, 2023Updated 3 years ago
- ☆25Dec 10, 2022Updated 3 years ago
- MEGR-APT: A Memory-Efficient APT Hunting System Based on Attack Representation Learning☆65Aug 26, 2025Updated 8 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆21Aug 10, 2024Updated last year
- TTPDrill focuses on developing automated and context-aware analytics of cyber threat intelligence to accurately learn attack patterns (TT…☆28May 29, 2020Updated 5 years ago
- AnnoCTR corpus for detection and linking of entities in cyber threat reports☆29Apr 12, 2024Updated 2 years ago
- Repository collecting and automagically processing public threat intelligence reports.☆19May 1, 2020Updated 6 years ago
- A Corpus of Data from Various Cybersecurity Blogs☆15Jun 28, 2022Updated 3 years ago
- Replication package for the paper "Automatic Mapping of Unstructured Cyber Threat Intelligence: An Experimental Study" published at the I…☆59Aug 29, 2022Updated 3 years ago
- ☆24Sep 5, 2023Updated 2 years ago
- ☆87Mar 29, 2023Updated 3 years ago
- ☆98Jun 17, 2024Updated last year
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Official code of Callee: Recovering Call Graphs for Binaries with Transfer and Contrastive Learning☆44Dec 17, 2023Updated 2 years ago
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆181Mar 23, 2023Updated 3 years ago
- The unified ICAS ontology designed to describe information-security related information☆28Feb 6, 2024Updated 2 years ago
- ☆35Jul 21, 2025Updated 9 months ago
- ☆43Apr 6, 2026Updated 3 weeks ago
- VulZoo: A Comprehensive Vulnerability Intelligence Dataset | ASE 2024 Demo☆72Mar 25, 2025Updated last year
- ☆89Jan 4, 2023Updated 3 years ago
- [NeurIPS'24, Spotlight] CTIBench: A Benchmark for Evaluating LLMs in Cyber Threat Intelligence☆83Feb 11, 2026Updated 2 months ago
- Code for ReF Decompile: Relabeling and Function Call Enhanced Decompile☆28Dec 7, 2025Updated 4 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Web Application Firewall Benchmark☆12May 14, 2022Updated 3 years ago
- This is a benchmark for evaluating the vulnerability discovery ability of automated approaches including Large Language Models (LLMs), de…☆79Nov 18, 2024Updated last year
- ☆10Jun 16, 2022Updated 3 years ago
- Information Security Knowledge Graph about NVD CAPEC CWE CPE ..☆67May 12, 2020Updated 5 years ago
- Open Source Threat Intelligence Platform☆166Jan 8, 2026Updated 3 months ago
- CyberAttack Sensing and Information Extraction☆74Dec 26, 2024Updated last year
- [42-b3yond-6ug] This repository hosts BugBuster, our team’s submission to the AI Cyber Challenge Final Competition.☆30Aug 19, 2025Updated 8 months ago
- Cyber attack attribution is the process of attempting to trace back a piece of code or malware to a perpetrator of a cyberattack. As cybe…☆15Jan 15, 2021Updated 5 years ago
- A cybersecurity dataset consisting of 4.3 million entries of Twitter, Blogs, Paper, and CVEs☆20May 26, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- SMET : Semantic Mapping of CVE to ATT&CK and its Application to Cybersecurity☆54Sep 14, 2024Updated last year
- OCR-APT: Reconstructing APT Stories through Subgraph Anomaly Detection and LLMs.☆34Feb 3, 2026Updated 2 months ago
- Code from the paper: Neurlux: Dynamic Malware Analysis Without Feature Engineering☆13Dec 27, 2020Updated 5 years ago
- 数据隐写:将数据嵌入到到 BMP 数据中☆11Oct 28, 2020Updated 5 years ago
- security course list☆14Sep 18, 2015Updated 10 years ago
- Tutorial on TikZ☆14Nov 15, 2024Updated last year
- code implementation of SEP(ICML 2022)☆37Jul 19, 2022Updated 3 years ago