FaroukDaboussi0 / Fine-Tuning-LLMs-for-Cyber-Threat-IntelligenceLinks
This project aims to fine-tune a pre-trained LLM using CTI-specific data and evaluate its performance with CTIBench, a benchmark designed for cybersecurity tasks. CTIBench helps assess how well the model performs on tasks like identifying threat actors, mapping attack techniques, and correlating vulnerabilities
☆15Updated last year
Alternatives and similar repositories for Fine-Tuning-LLMs-for-Cyber-Threat-Intelligence
Users that are interested in Fine-Tuning-LLMs-for-Cyber-Threat-Intelligence are comparing it to the libraries listed below
Sorting:
- SYNAPSE (SYNthetic AI Pot for Security Enhancement) and SYNAPSE-to-MITRE code repository. This project has been realized for my MSc degre…☆16Updated last year
- This is a dataset intended to train a LLM model for a completely CVE focused input and output.☆64Updated 5 months ago
- LLM Honeypot: Leveraging Large Language Models as Advanced Interactive Honeypot Systems☆25Updated 7 months ago
- Automatically collects the known CVE and its corresponding Poc, and sends it to the LLM for analysis, disassembles the attack steps, gene…☆20Updated last year
- Cyber attack attribution is the process of attempting to trace back a piece of code or malware to a perpetrator of a cyberattack. As cybe…☆15Updated 4 years ago
- Code for shelLM tool☆56Updated 9 months ago
- VulZoo: A Comprehensive Vulnerability Intelligence Dataset | ASE 2024 Demo☆66Updated 8 months ago
- Chat4GPT Experiments for Security☆11Updated 2 years ago
- Code for the paper - Malicious URL Detection via Pretrained Language Model-Guided Multi-Level Feature Attention Network☆14Updated last year
- This repository contains attack chains generated by Aurora that can be reproduced in virtual environments.☆30Updated 3 months ago
- Code for Book "AI for Cybersecurity: A Handbook of Use Case"☆21Updated 2 years ago
- Code for Benchmarking two ML Approaches performing Authorship Attribution☆42Updated 3 years ago
- ☆75Updated 2 weeks ago
- Security papers about software vulnerabilities and exploits☆13Updated 6 years ago
- ☆19Updated 10 months ago
- ☆10Updated 5 years ago
- A collection of agents that use Large Language Models (LLMs) to perform tasks common on our day to day jobs in cyber security.☆213Updated last year
- ☆43Updated last year
- pretrained BERT model for cyber security text, learned CyberSecurity Knowledge☆201Updated 2 years ago
- IoT and Operational Technology Honeypot☆104Updated 2 years ago
- ☆34Updated last year
- A large-scale database of malicious software images☆48Updated 4 years ago
- ☆38Updated last year
- Tzer: TVM Implementation of "Coverage-Guided Tensor Compiler Fuzzing with Joint IR-Pass Mutation (OOPSLA'22)“.☆12Updated 3 years ago
- MEGR-APT: A Memory-Efficient APT Hunting System Based on Attack Representation Learning☆52Updated 2 months ago
- Grey-box fuzzer SIVO☆13Updated 4 years ago
- EVIL (Exploiting software VIa natural Language) is an approach to automatically generate software exploits in assembly/Python language fr…☆28Updated 3 years ago
- [NAACL 2025] LLM-Supported Natural Language to Bash Translation☆13Updated 4 months ago
- An ever-growing list of resources for data-driven vulnerability assessment and prioritization☆130Updated 2 years ago
- PackGenome: Automatically Generating Robust YARA Rules for Accurate Malware Packer Detection☆27Updated last year