A dataset containing APT group related articles and MITRE ATT&CK technique descriptions
☆18Aug 14, 2019Updated 6 years ago
Alternatives and similar repositories for Attack-Technique-Dataset
Users that are interested in Attack-Technique-Dataset are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- RENet is a deep learning tensorflow2.0 model for classify ATT&CK techniques and tactics for cyber threat intelligence with relevance enha…☆12Jan 11, 2023Updated 3 years ago
- This repository contains OpenIOC rules to aid in hunting for indicators of compromise and TTPs focused on Advanced Persistent Threat grou…☆26Oct 3, 2023Updated 2 years ago
- This repository holds the data, source code and resulting model weights for the paper "Towards end-to-end Cyberthreat Detection from Twit…☆17Sep 14, 2021Updated 4 years ago
- matlab☆10Aug 16, 2018Updated 7 years ago
- A heuristic, python-based detector for fast-flux botnets.☆13Feb 24, 2012Updated 14 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Threat hunting in social media☆12Feb 17, 2019Updated 7 years ago
- 本项目展示了2022年部分信息检索/数据挖掘顶会论文分类。☆17Jun 13, 2022Updated 3 years ago
- ATT&CK技战术数据☆15Feb 8, 2021Updated 5 years ago
- multi-agent pathfinding via dqn☆16May 19, 2021Updated 4 years ago
- TTPDrill focuses on developing automated and context-aware analytics of cyber threat intelligence to accurately learn attack patterns (TT…☆28May 29, 2020Updated 5 years ago
- ☆12Feb 18, 2021Updated 5 years ago
- ☆39May 25, 2021Updated 4 years ago
- This repository holds the dataset used to conduct experiments for the "Cyberthreat Detection from Twitter using Deep Neural Networks" acc…☆31Jul 15, 2020Updated 5 years ago
- A Matlab and Simulink simulation of a False Data Injection against KF State Estimation☆16Jul 7, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Falconn++ is a locality-sensitive filtering (LSF) approach, built on top of cross-polytope LSH (FalconnLib) to answer approximate nearest…☆13Aug 5, 2024Updated last year
- Threat Research Blog 威胁情报提取与溯源技术研究小组☆31May 2, 2018Updated 7 years ago
- security course list☆14Sep 18, 2015Updated 10 years ago
- PyTorch implementation of the paper "Privacy-preserving Few-shot Traffic Detection against Advanced Persistent Threats via Federated Meta…☆22Dec 14, 2023Updated 2 years ago
- Official code of Nash-DQN for paper: Nash-DQN algorithm for two-player zero-sum Markov games, details see our paper: A Deep Reinforcement…☆20Aug 26, 2022Updated 3 years ago
- Corpus of auto-labeled text for the cyber security domain☆97Nov 27, 2019Updated 6 years ago
- A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials and vulnerable applications to practice on…☆12Jul 7, 2024Updated last year
- APT Malware Dataset Containing over 3,500 State-Sponsored Malware Samples☆370Nov 10, 2022Updated 3 years ago
- provides a new dataset for NER missions in cyber threat intelligence (CTI) field.☆42Aug 3, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆12Jul 4, 2024Updated last year
- A PyTorch implementation of Dynamic Bernoulli Embeddings☆13Dec 26, 2022Updated 3 years ago
- Payloads that can be used for testing web application firewalls☆15Oct 11, 2022Updated 3 years ago
- 短文本分类、多标签分类方法封装☆15Jun 12, 2023Updated 2 years ago
- Few-Shot Relation Extraction with AllenNLP☆12Jan 27, 2019Updated 7 years ago
- 中文 aiml 机器人实现,文档见:☆18Jan 10, 2019Updated 7 years ago
- Cyber Security concepts extracted from unstructured threat intelligence reports using Named Entity Recognition☆116May 27, 2023Updated 2 years ago
- Still in dev mode☆12Apr 24, 2018Updated 7 years ago
- Extracts indicators of compromise (IOCs), including domain names, IPv4 addresses, email addresses, and hashes, from text.☆11Dec 10, 2017Updated 8 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- My logstash plugins. Filter: sig (for security detect -> IOC, sig, New value, Reference, link, frequence, ...). Output: alert created by …☆10Jul 26, 2019Updated 6 years ago
- ☆10Apr 18, 2019Updated 6 years ago
- Lign (/lignə/): Extension to PyTorch for graphs and geometric deep learning☆16Oct 20, 2023Updated 2 years ago
- Phishing URL Detection Tool☆14May 22, 2023Updated 2 years ago
- Annotate IDA with source and line number information from a PDB☆15Apr 15, 2021Updated 4 years ago
- Tools for analyzing the Controller Placement Problem in Software-Defined Networks.☆20Jun 25, 2012Updated 13 years ago
- JDBL automatically removes unnecessary bytecode from Java applications through dynamic analysis https://dl.acm.org/doi/abs/10.1145/354694…☆17Aug 15, 2023Updated 2 years ago