LiuYuancheng / Threats_2_MITRE_AI_Mapper
The objective of this program is to leverage AI-LLM technology to process of human language-based CTI documents to succinctly summarize the attack flow path outlined within such materials via mapping the attack behaviors to the MITRE-ATT&CK and matching the vulnerabilities to MITRE-CWE.
☆29Updated 7 months ago
Related projects ⓘ
Alternatives and complementary repositories for Threats_2_MITRE_AI_Mapper
- We want to create a dashboard (with knowledge graphs) to visualize the network node communication situation based on the firewall logs to…☆13Updated 3 weeks ago
- The primary objective of this project is to develop a cross-platform Python library capable of simulating the core fundamental functional…☆29Updated 2 weeks ago
- We want to create a Repo which can provide different Malwares wrote by Python.☆12Updated 3 weeks ago
- We want to build a city simulator OT(Operational Technology) system with two railways and create two kinds of HMI software (Engineer moni…☆50Updated last year
- Welcome to MitreMesh. Where MITRE's framework meets dynamic scenario generation, creating a comprehensive net of incident response tests …☆15Updated last year
- SMET : Semantic Mapping of CVE to ATT&CK and its Application to Cybersecurity☆36Updated 2 months ago
- ☆185Updated this week
- pretrained BERT model for cyber security text, learned CyberSecurity Knowledge☆158Updated last year
- This project is aimed to create a trustClient(use TrustZone on ARM) and a server program to verify whether a executable program on Raspbe…☆11Updated 8 months ago
- TRAM is an open-source platform designed to advance research into automating the mapping of cyber threat intelligence reports to MITRE AT…☆453Updated last week
- A collection of agents that use Large Language Models (LLMs) to perform tasks common on our day to day jobs in cyber security.☆56Updated 6 months ago
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆75Updated 11 months ago
- AI-powered tool designed to help producing Threat Intelligence Mindmap.☆76Updated last month
- Intel Retrieval Augmented Generation (RAG) Utilities☆88Updated 9 months ago
- "Linking Threat Tactics, Techniques, and Patterns with Defensive Weaknesses, Vulnerabilities and Affected Platform Configurations for Cyb…☆87Updated 4 months ago
- An overview of LLMs for cybersecurity.☆446Updated 2 months ago
- ☆99Updated 5 months ago
- ☆66Updated 3 months ago
- Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogue…☆43Updated last month
- Save toil in security operations with: Detection & Intelligence Analysis for New Alerts (D.I.A.N.A. )☆157Updated 2 months ago
- 🚨ATTENTION🚨 The CVE mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here as…☆232Updated 7 months ago
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆204Updated last year
- ☆74Updated last week
- some prompt about cyber security☆154Updated last year
- An IDE and translation engine for detection engineers and threat hunters. Be faster, write smarter, keep 100% privacy.☆131Updated this week
- Sensor Mappings to ATT&CK is a collection of resources to assist cyber defenders with understanding which sensors and events can help det…☆45Updated 5 months ago
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆68Updated 6 months ago
- CALDERA plugin for adversary emulation of AI-enabled systems☆85Updated last year
- The principal objective of this project is to develop a knowledge base of the tactics, techniques, and procedures (TTPs) used by insiders…☆138Updated 2 months ago