☆42Feb 18, 2026Updated last month
Alternatives and similar repositories for SEevenLLM
Users that are interested in SEevenLLM are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆10Jan 21, 2019Updated 7 years ago
- RENet is a deep learning tensorflow2.0 model for classify ATT&CK techniques and tactics for cyber threat intelligence with relevance enha…☆12Jan 11, 2023Updated 3 years ago
- ☆36Jan 27, 2026Updated 2 months ago
- ☆24Dec 10, 2022Updated 3 years ago
- TTPDrill focuses on developing automated and context-aware analytics of cyber threat intelligence to accurately learn attack patterns (TT…☆28May 29, 2020Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- AnnoCTR corpus for detection and linking of entities in cyber threat reports☆28Apr 12, 2024Updated 2 years ago
- Repository collecting and automagically processing public threat intelligence reports.☆19May 1, 2020Updated 5 years ago
- A Corpus of Data from Various Cybersecurity Blogs☆15Jun 28, 2022Updated 3 years ago
- Replication package for the paper "Automatic Mapping of Unstructured Cyber Threat Intelligence: An Experimental Study" published at the I…☆59Aug 29, 2022Updated 3 years ago
- CLAP(Contrastive Language-Assembly Pre-training) learns transferable binary code representations with natural language supervision☆73Sep 28, 2024Updated last year
- ☆24Sep 5, 2023Updated 2 years ago
- 利用知识图 谱分析网络安全事件☆42Mar 30, 2020Updated 6 years ago
- ☆98Jun 17, 2024Updated last year
- Official code of Callee: Recovering Call Graphs for Binaries with Transfer and Contrastive Learning☆43Dec 17, 2023Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- The unified ICAS ontology designed to describe information-security related information☆28Feb 6, 2024Updated 2 years ago
- ☆32Jul 21, 2025Updated 8 months ago
- VulZoo: A Comprehensive Vulnerability Intelligence Dataset | ASE 2024 Demo☆72Mar 25, 2025Updated last year
- 基于Qwen2.5模型、使用DISC-Law-SFT-Pair数据集微调的法律大模型☆12Dec 29, 2024Updated last year
- ☆89Jan 4, 2023Updated 3 years ago
- [NeurIPS'24, Spotlight] CTIBench: A Benchmark for Evaluating LLMs in Cyber Threat Intelligence☆81Feb 11, 2026Updated 2 months ago
- Code for ReF Decompile: Relabeling and Function Call Enhanced Decompile☆28Dec 7, 2025Updated 4 months ago
- Simple Chatbot for testing AI Red Team tooling☆17Feb 11, 2025Updated last year
- This is a benchmark for evaluating the vulnerability discovery ability of automated approaches including Large Language Models (LLMs), de…☆79Nov 18, 2024Updated last year
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Open Source Threat Intelligence Platform☆166Jan 8, 2026Updated 3 months ago
- CyberAttack Sensing and Information Extraction☆73Dec 26, 2024Updated last year
- [42-b3yond-6ug] This repository hosts BugBuster, our team’s submission to the AI Cyber Challenge Final Competition.☆30Aug 19, 2025Updated 7 months ago
- 基于prompt learning的NLP算法,涉及文本分类、信息抽取等☆15Jan 12, 2023Updated 3 years ago
- Cyber attack attribution is the process of attempting to trace back a piece of code or malware to a perpetrator of a cyberattack. As cybe…☆15Jan 15, 2021Updated 5 years ago
- A cybersecurity dataset consisting of 4.3 million entries of Twitter, Blogs, Paper, and CVEs☆20May 26, 2023Updated 2 years ago
- SMET : Semantic Mapping of CVE to ATT&CK and its Application to Cybersecurity☆52Sep 14, 2024Updated last year
- Code from the paper: Neurlux: Dynamic Malware Analysis Without Feature Engineering☆13Dec 27, 2020Updated 5 years ago
- 数据隐写:将数据嵌入到到 BMP 数据中☆11Oct 28, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Paper list of LLM fingerprinting, based on our paper titled "SoK: Large Language Model Copyright Auditing via Fingerprinting".☆22Aug 28, 2025Updated 7 months ago
- ☆13May 15, 2025Updated 10 months ago
- 清羽(ClearFeather)是一款专为网络安全攻防演练设计的资产智能清洗与分类工具。它能够自动化处理攻防演练中的各类资产数据,包括IP、域名、URL等,通过结合DeepSeek API的大语言模型能力和精准的正则表达式处理,实现资产的高效识别、分类与整理。☆24May 29, 2025Updated 10 months ago
- LiveSecBench:动态中文大模型安全榜单☆28Mar 9, 2026Updated last month
- The repo of "Coral: Maliciously Secure Computation Framework for Packed and Mixed Circuits" (CCS 2024)☆12Sep 6, 2024Updated last year
- Tutorial on TikZ☆14Nov 15, 2024Updated last year
- Bring Your Own Mitre Att&ck © Matrix !☆13Oct 19, 2023Updated 2 years ago