FaroukDaboussi0 / Fine-Tuning-LLMs-for-Cyber-Threat-IntelligenceLinks
This project aims to fine-tune a pre-trained LLM using CTI-specific data and evaluate its performance with CTIBench, a benchmark designed for cybersecurity tasks. CTIBench helps assess how well the model performs on tasks like identifying threat actors, mapping attack techniques, and correlating vulnerabilities
☆14Updated last year
Alternatives and similar repositories for Fine-Tuning-LLMs-for-Cyber-Threat-Intelligence
Users that are interested in Fine-Tuning-LLMs-for-Cyber-Threat-Intelligence are comparing it to the libraries listed below
Sorting:
- This is a dataset intended to train a LLM model for a completely CVE focused input and output.☆63Updated 2 months ago
- SYNAPSE (SYNthetic AI Pot for Security Enhancement) and SYNAPSE-to-MITRE code repository. This project has been realized for my MSc degre…☆15Updated 11 months ago
- This repository contains attack chains generated by Aurora that can be reproduced in virtual environments.☆24Updated last month
- SMET : Semantic Mapping of CVE to ATT&CK and its Application to Cybersecurity☆48Updated last year
- ☆25Updated 4 years ago
- ☆35Updated last year
- Code for shelLM tool☆56Updated 7 months ago
- pretrained BERT model for cyber security text, learned CyberSecurity Knowledge☆188Updated 2 years ago
- A logic-based enterprise network security analyzer☆128Updated 2 years ago
- Code for the paper - Malicious URL Detection via Pretrained Language Model-Guided Multi-Level Feature Attention Network☆14Updated last year
- A large-scale database of malicious software images☆48Updated 4 years ago
- SecureBERT is a domain-specific language model to represent cybersecurity textual data.☆97Updated last year
- Defense from the 2020 Microsoft Evasion Competition☆17Updated 4 years ago
- LLM Honeypot: Leveraging Large Language Models as Advanced Interactive Honeypot Systems☆21Updated 5 months ago
- Code for Benchmarking two ML Approaches performing Authorship Attribution☆39Updated 3 years ago
- Chat4GPT Experiments for Security☆11Updated 2 years ago
- Automatically collects the known CVE and its corresponding Poc, and sends it to the LLM for analysis, disassembles the attack steps, gene…☆20Updated last year
- A collection of agents that use Large Language Models (LLMs) to perform tasks common on our day to day jobs in cyber security.☆171Updated last year
- MEGR-APT: A Memory-Efficient APT Hunting System Based on Attack Representation Learning☆51Updated 3 weeks ago
- Automatic Malware Signature Generation Tool☆16Updated 3 years ago
- An ever-growing list of resources for data-driven vulnerability assessment and prioritization☆129Updated 2 years ago
- GPT-3 use cases for Cybersecurity☆52Updated 2 years ago
- CyberMetric dataset☆101Updated 8 months ago
- Cyber attack attribution is the process of attempting to trace back a piece of code or malware to a perpetrator of a cyberattack. As cybe…☆15Updated 4 years ago
- NLP model and tech for cyber security tasks☆87Updated 2 years ago
- malicious PowerShell script detection model☆41Updated 4 years ago
- Adversarial Malware Generator Using GANs☆55Updated last year
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆162Updated 2 years ago
- VulZoo: A Comprehensive Vulnerability Intelligence Dataset | ASE 2024 Demo☆62Updated 5 months ago
- We implement MalGAN to attack several PDF classifiers and evaluate the robustness of those models.☆26Updated 3 years ago