Qihoo360 / Luwak
利用预训练语言模型从非结构化威胁报告中提取 MITRE ATT&CK TTP 信息
☆72Updated last year
Alternatives and similar repositories for Luwak:
Users that are interested in Luwak are comparing it to the libraries listed below
- Hades is an cross-platform HIDS with kernel-space data collection.☆44Updated last year
- ☆30Updated last year
- ☆45Updated 3 years ago
- Low-level RASP: Protecting Applications Implemented in High-level Programming Languages☆59Updated last year
- 17条检测cobaltstrike的suricata-ids规则☆64Updated 2 years ago
- 攻击流量包,辅助安全运营/分析人员,HVV蓝队工程师开展流量攻击研判工作☆61Updated last year
- ☆20Updated 4 years ago
- 黑客画像构建以及威胁事件的预测,通过搜集各大黑客技术论坛的聊天记录,绘制任务的拓扑图,以及技能雷达图。同时进一步预测监控攻击事件的发生以及溯源☆21Updated 6 years ago
- 恶意脚本检测分类工具☆40Updated 4 years ago
- SysTracer: Linux 系统活动跟踪器☆31Updated 2 years ago
- CVE-2021-36798: CobaltStrike < 4.4 Dos☆103Updated 3 years ago
- 《深入理解DAST动态应用程序安全测试》Dynamic Application Security Testing.☆49Updated 2 years ago
- 由人工智能驱动的渗透测试解决方案☆44Updated 8 months ago
- Vulnerability Environment Build with Dockerfile -> Docker Hub☆16Updated 4 months ago
- 模拟cobalt strike beacon上线包. Simulation cobalt strike beacon connection packet.☆78Updated 2 years ago
- 伪造cs上线流量,实现cs批量上线,欺骗防御☆35Updated 2 years ago
- cloud-audit (云安全审计助手)是检测公有云厂商AK/SK泄漏被利用的工具,通过定期调用云平台接口审计日志,基于异常行为/黑特征/基线发现疑似入侵行为。☆38Updated 10 months ago
- 机器学习检测webshell☆67Updated 3 years ago
- NOPEN Tool 又名“morerats” 莫雷斯特,是方程式工具包里的工具。☆45Updated 3 years ago
- 工控安全概览☆82Updated 2 years ago
- ☆22Updated 5 years ago
- NextB的恶意邮件识别项目☆30Updated 2 years ago
- 收集规则☆30Updated 2 years ago
- A BeaconEye implement in Golang. It is used to detect the cobaltstrike beacon from memory and extract some configuration.☆157Updated 2 years ago
- WPS 0day.hen the wps software is running, an api interface with port 4709 will be opened. An attacker can request this interface to execu…☆92Updated 7 months ago
- Python nbtstat + smb_version without third party packages☆30Updated 3 years ago
- slides and papers from (or partly from) Bonan☆22Updated last year
- collect some exploit traffic pcap☆80Updated last month
- 容器安全漏洞的分析与复现☆156Updated last year
- YaraSploit is a collection of Yara rules generated from Metasploit framework shellcodes.☆44Updated last year