Netsec-SJTU / LLM-TIKG-datasetView external linksLinks
A labeled dataset used for the knowledge graph construction.
☆35Nov 30, 2023Updated 2 years ago
Alternatives and similar repositories for LLM-TIKG-dataset
Users that are interested in LLM-TIKG-dataset are comparing it to the libraries listed below
Sorting:
- ☆90Jan 4, 2023Updated 3 years ago
- ☆40Jul 6, 2024Updated last year
- Replication package for the paper "Automatic Mapping of Unstructured Cyber Threat Intelligence: An Experimental Study" published at the I…☆57Aug 29, 2022Updated 3 years ago
- RENet is a deep learning tensorflow2.0 model for classify ATT&CK techniques and tactics for cyber threat intelligence with relevance enha…☆12Jan 11, 2023Updated 3 years ago
- A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports☆28Aug 21, 2023Updated 2 years ago
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆180Mar 23, 2023Updated 2 years ago
- Knowledge Graph Error Detection with Contrastive Confidence Adaption, AAAI 2024☆20May 3, 2024Updated last year
- ☆18Mar 31, 2019Updated 6 years ago
- APT-KGL: An Intelligent APT Detection System Based on Threat Knowledge and Heterogeneous Provenance Graph Learning☆78Jul 8, 2022Updated 3 years ago
- GenAI-STIX2.1-Generator is a tool that leverages Azure OpenAI capabilities to transform threat intelligence reports from unstructured web…☆23Mar 24, 2025Updated 10 months ago
- A python app to predict Att&ck tactics and techniques from cyber threat reports☆128Nov 15, 2023Updated 2 years ago
- AnnoCTR corpus for detection and linking of entities in cyber threat reports☆26Apr 12, 2024Updated last year
- ☆32Jul 21, 2025Updated 6 months ago
- ☆34Mar 31, 2019Updated 6 years ago
- ☆24Aug 15, 2020Updated 5 years ago
- TTPDrill focuses on developing automated and context-aware analytics of cyber threat intelligence to accurately learn attack patterns (TT…☆28May 29, 2020Updated 5 years ago
- A curated list of GPT agents for cybersecurity☆12Oct 2, 2024Updated last year
- Training Language Model Agents to Find Vulnerabilities with CTF-Dojo☆32Jan 10, 2026Updated last month
- [Tensorflow] A Game Theoretic approach using GAN for Phishing URL synthesis and detection☆11Nov 14, 2022Updated 3 years ago
- Panda - is a set of utilities used to research how PsExec encrypts its traffic.☆12Apr 20, 2021Updated 4 years ago
- Tool to decrypt encrypted strings in AgentTesla☆16Jan 24, 2022Updated 4 years ago
- ☆44Apr 29, 2020Updated 5 years ago
- BLEU Score in Rust☆12Jan 1, 2026Updated last month
- Graphics, icons, and diagrams to support STIX 2☆48Jun 2, 2021Updated 4 years ago
- STIX Schema Development☆75Aug 1, 2018Updated 7 years ago
- Stampy's copy of Alignment Research Dataset scraper☆13Dec 26, 2025Updated last month
- ☆14Apr 4, 2019Updated 6 years ago
- Transform dumped executable memory back into an identical match from disk. Use network or local database to de-locate relocated binaries…☆12Jan 10, 2016Updated 10 years ago
- SysFlow collection probe☆16Nov 11, 2025Updated 3 months ago
- [Arxiv 2025] Official code and datasets of paper: GNNs as Predictors of Agentic Workflow Performances☆21Jan 15, 2026Updated 3 weeks ago
- ☆12Aug 12, 2024Updated last year
- ☆10Jun 16, 2022Updated 3 years ago
- CVE\CWE\CAPEC\ATT&CK, security knowledge graph, knowledge graph completion☆14Jun 9, 2023Updated 2 years ago
- ☆11Oct 13, 2020Updated 5 years ago
- Trains Sparse Autoencoders based on outputs from language models☆11Oct 7, 2024Updated last year
- ☆13Nov 10, 2020Updated 5 years ago
- Advancing TTP Analysis: Harnessing the Power of Large Language Models with Retrieval Augmented Generation☆11May 14, 2024Updated last year
- A Multi-classification of chinese text with cnn-rnn model.☆11Jun 1, 2018Updated 7 years ago
- ☆14Sep 28, 2023Updated 2 years ago