RezzFayyazi / TTP-LLMLinks
Advancing TTP Analysis: Harnessing the Power of Large Language Models with Retrieval Augmented Generation
☆11Updated last year
Alternatives and similar repositories for TTP-LLM
Users that are interested in TTP-LLM are comparing it to the libraries listed below
Sorting:
- Replication package for the paper "Automatic Mapping of Unstructured Cyber Threat Intelligence: An Experimental Study" published at the I…☆58Updated 3 years ago
- ☆10Updated 3 years ago
- pretrained BERT model for cyber security text, learned CyberSecurity Knowledge☆206Updated 2 years ago
- CVE2ATT&CK: BERT-based mapping of CVEs to MITRE ATT&CK Techniques☆21Updated 3 years ago
- SecureBERT is a domain-specific language model to represent cybersecurity textual data.☆110Updated last year
- A comprehensive survey of datasets for research in host-based and/or network-based intrusion detection, with a focus on enterprise networ…☆49Updated last week
- Benign .NET files☆42Updated last year
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆178Updated 2 years ago
- ☆38Updated last year
- ☆36Updated this week
- An overview of LLMs for cybersecurity.☆1,197Updated last month
- ATLAS: A Sequence-based Learning Approach for Attack Investigation☆176Updated 3 years ago
- A labeled dataset used for the knowledge graph construction.☆33Updated 2 years ago
- SMET : Semantic Mapping of CVE to ATT&CK and its Application to Cybersecurity☆52Updated last year
- Transformer Neural Network for Dynamic Malware Detection☆38Updated this week
- Public datasets to help you address various cyber security problems.☆463Updated 3 years ago
- Instructions and tools to use data from engagement 5 of Darpa Transparent Computing Program☆26Updated 4 years ago
- Have fun with audit log analysis :)☆153Updated last year
- Dataset with labeled benign and malicious files 🗃️☆149Updated 2 years ago
- ☆90Updated 3 years ago
- An extended version of SecureBERT, trained on top of both base and large version of RoBERTa using 10 GB cybersecurity-related data☆31Updated 2 years ago
- SHADEWATCHER: Recommendation-guided Cyber Threat Analysis using System Audit Records, Oakland'22☆83Updated 2 years ago
- TRAM is an open-source platform designed to advance research into automating the mapping of cyber threat intelligence reports to MITRE AT…☆545Updated 8 months ago
- AnnoCTR corpus for detection and linking of entities in cyber threat reports☆26Updated last year
- Automated Discovery and Mapping ATT&CK Tactics and Techniques for Unstructured Cyber Threat Intelligence☆19Updated 2 years ago
- ☆32Updated 6 months ago
- Code for our DLS'21 paper - BODMAS: An Open Dataset for Learning based Temporal Analysis of PE Malware. BODMAS is short for Blue Hexagon …☆92Updated last year
- Malware dataset for security researchers, data scientists. Public malware dataset generated by Cuckoo Sandbox based on Windows OS API cal…☆257Updated 4 years ago
- Codes and data for USENIX Security 24 paper "MAGIC: Detecting Advanced Persistent Threats via Masked Graph Representation Learning"☆129Updated last year
- Original implementation and resources of DeepCASE as in the S&P '22 paper☆98Updated 2 years ago