RezzFayyazi / TTP-LLMLinks
Advancing TTP Analysis: Harnessing the Power of Large Language Models with Retrieval Augmented Generation
☆10Updated last year
Alternatives and similar repositories for TTP-LLM
Users that are interested in TTP-LLM are comparing it to the libraries listed below
Sorting:
- CVE2ATT&CK: BERT-based mapping of CVEs to MITRE ATT&CK Techniques☆21Updated 3 years ago
- Replication package for the paper "Automatic Mapping of Unstructured Cyber Threat Intelligence: An Experimental Study" published at the I…☆56Updated 3 years ago
- Public datasets to help you address various cyber security problems.☆456Updated 3 years ago
- TRAM is an open-source platform designed to advance research into automating the mapping of cyber threat intelligence reports to MITRE AT…☆526Updated 6 months ago
- pretrained BERT model for cyber security text, learned CyberSecurity Knowledge☆201Updated 2 years ago
- A comprehensive survey of datasets for research in host-based and/or network-based intrusion detection, with a focus on enterprise networ…☆48Updated last month
- SecureBERT is a domain-specific language model to represent cybersecurity textual data.☆104Updated last year
- ☆36Updated last year
- An overview of LLMs for cybersecurity.☆1,120Updated 6 months ago
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆173Updated 2 years ago
- KRYSTAL: Knowledge Graph-based Framework for Tactical Attack Discovery in Audit Data☆38Updated last year
- A labeled dataset used for the knowledge graph construction.☆30Updated last year
- ☆84Updated 2 years ago
- ATLAS: A Sequence-based Learning Approach for Attack Investigation☆169Updated 3 years ago
- STIX data representing MITRE ATT&CK☆486Updated last week
- A python module for working with ATT&CK☆623Updated last week
- Original implementation and resources of DeepCASE as in the S&P '22 paper☆96Updated 2 years ago
- EagleEye: Transformer-based malware detection - https://ieeexplore.ieee.org/document/10896250☆13Updated 8 months ago
- Benign .NET files☆38Updated last year
- ☆34Updated 2 years ago
- System traces dataset generation tool.☆13Updated 3 years ago
- "Linking Threat Tactics, Techniques, and Patterns with Defensive Weaknesses, Vulnerabilities and Affected Platform Configurations for Cyb…☆99Updated last week
- An ML framework for building provenance-based intrusion detection systems (USENIX Sec'25)☆40Updated 3 weeks ago
- An extended version of SecureBERT, trained on top of both base and large version of RoBERTa using 10 GB cybersecurity-related data☆31Updated last year
- We propose Endpoint Forecasting and Interpreting (EFI), a real-time attack forecast and interpretation system, which can automatically pr…☆14Updated 2 years ago
- Public Arena dataset☆15Updated 3 years ago
- SMET : Semantic Mapping of CVE to ATT&CK and its Application to Cybersecurity☆51Updated last year
- ☆125Updated 5 years ago
- Material from the DARPA Transparent Computing Program☆216Updated 5 years ago
- Dataset with labeled benign and malicious files 🗃️☆141Updated 2 years ago