☆41Feb 18, 2026Updated last week
Alternatives and similar repositories for SEevenLLM
Users that are interested in SEevenLLM are comparing it to the libraries listed below
Sorting:
- ☆10Jan 21, 2019Updated 7 years ago
- RENet is a deep learning tensorflow2.0 model for classify ATT&CK techniques and tactics for cyber threat intelligence with relevance enha…☆12Jan 11, 2023Updated 3 years ago
- A labeled dataset used for the knowledge graph construction.☆35Nov 30, 2023Updated 2 years ago
- ☆36Jan 27, 2026Updated last month
- MEGR-APT: A Memory-Efficient APT Hunting System Based on Attack Representation Learning☆62Aug 26, 2025Updated 6 months ago
- ☆24Dec 10, 2022Updated 3 years ago
- AnnoCTR corpus for detection and linking of entities in cyber threat reports☆26Apr 12, 2024Updated last year
- CLAP(Contrastive Language-Assembly Pre-training) learns transferable binary code representations with natural language supervision☆72Sep 28, 2024Updated last year
- Replication package for the paper "Automatic Mapping of Unstructured Cyber Threat Intelligence: An Experimental Study" published at the I…☆57Aug 29, 2022Updated 3 years ago
- ☆24Aug 15, 2020Updated 5 years ago
- TTPDrill focuses on developing automated and context-aware analytics of cyber threat intelligence to accurately learn attack patterns (TT…☆28May 29, 2020Updated 5 years ago
- ☆18Aug 10, 2024Updated last year
- Repository collecting and automagically processing public threat intelligence reports.☆18May 1, 2020Updated 5 years ago
- Papers on concurrency vulnerability analysis, including multithreaded programs, multi-tasking programs and interrupt driven programs.☆15Nov 11, 2022Updated 3 years ago
- Automated Discovery and Mapping ATT&CK Tactics and Techniques for Unstructured Cyber Threat Intelligence☆19Jan 26, 2024Updated 2 years ago
- Official code of Callee: Recovering Call Graphs for Binaries with Transfer and Contrastive Learning☆43Dec 17, 2023Updated 2 years ago
- OASIS-TAC-TC: OWL representation of the TAC TCs work products are maintained here. - https://github.com/oasis-tcs/tac-ontology☆16Oct 27, 2021Updated 4 years ago
- Cyber attack attribution is the process of attempting to trace back a piece of code or malware to a perpetrator of a cyberattack. As cybe…☆15Jan 15, 2021Updated 5 years ago
- This is a benchmark for evaluating the vulnerability discovery ability of automated approaches including Large Language Models (LLMs), de…☆76Nov 18, 2024Updated last year
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆182Mar 23, 2023Updated 2 years ago
- Code for ReF Decompile: Relabeling and Function Call Enhanced Decompile☆26Dec 7, 2025Updated 2 months ago
- An Automated Heap Feng Shui Tool☆18Jun 27, 2022Updated 3 years ago
- 利用知识图谱分析网络安全事件☆42Mar 30, 2020Updated 5 years ago
- SMET : Semantic Mapping of CVE to ATT&CK and its Application to Cybersecurity☆52Sep 14, 2024Updated last year
- ☆86Mar 29, 2023Updated 2 years ago
- This tool calculates tricky canonical huffman histogram for CVE-2023-4863.☆26Dec 20, 2023Updated 2 years ago
- The unified ICAS ontology designed to describe information-security related information☆28Feb 6, 2024Updated 2 years ago
- ☆98Jun 17, 2024Updated last year
- Open-source code for RFCNLP paper.☆57Nov 9, 2022Updated 3 years ago
- ☆39Dec 31, 2025Updated 2 months ago
- ☆32Jul 21, 2025Updated 7 months ago
- ☆34Aug 28, 2024Updated last year
- ☆81Feb 11, 2026Updated 2 weeks ago
- Binary Ninja plugin to provide LLM assistance analyzing binaries.☆49Updated this week
- This repository contains attack chains generated by Aurora that can be reproduced in virtual environments.☆43Jan 25, 2026Updated last month
- ☆28Aug 6, 2022Updated 3 years ago
- GitHub Cloner & Compiler☆76Sep 24, 2021Updated 4 years ago
- Information Security Knowledge Graph about NVD CAPEC CWE CPE ..☆66May 12, 2020Updated 5 years ago
- Extracting Attack Behavior from Threat Reports☆81Apr 28, 2023Updated 2 years ago