A Corpus of Data from Various Cybersecurity Blogs
☆15Jun 28, 2022Updated 3 years ago
Alternatives and similar repositories for CyEnts-Cyber-Blog-Dataset
Users that are interested in CyEnts-Cyber-Blog-Dataset are comparing it to the libraries listed below
Sorting:
- ☆10Jan 21, 2019Updated 7 years ago
- Cyber Security concepts extracted from unstructured threat intelligence reports using Named Entity Recognition☆116May 27, 2023Updated 2 years ago
- provides a new dataset for NER missions in cyber threat intelligence (CTI) field.☆42Aug 3, 2022Updated 3 years ago
- Official repository for MalKG☆24Feb 12, 2021Updated 5 years ago
- RENet is a deep learning tensorflow2.0 model for classify ATT&CK techniques and tactics for cyber threat intelligence with relevance enha…☆12Jan 11, 2023Updated 3 years ago
- ☆12Feb 18, 2021Updated 5 years ago
- Focusing on potential named entities during active label acquisition.☆10Oct 8, 2024Updated last year
- Parsing MITRE EDR Evaluation results☆12Dec 5, 2018Updated 7 years ago
- TTPDrill focuses on developing automated and context-aware analytics of cyber threat intelligence to accurately learn attack patterns (TT…☆28May 29, 2020Updated 5 years ago
- Distantly Supervised Biomedical Named Entity Recognition with Dictionary Expansion: https://ieeexplore.ieee.org/document/8983212☆13Jun 4, 2020Updated 5 years ago
- Extract cyber security entities from unstructured text☆34Apr 24, 2017Updated 8 years ago
- OASIS-TAC-TC: OWL representation of the TAC TCs work products are maintained here. - https://github.com/oasis-tcs/tac-ontology☆16Oct 27, 2021Updated 4 years ago
- An idea that take advantages of features of deep learning to use unannotated samples for NER and identify sequences with error labels.☆16Feb 4, 2024Updated 2 years ago
- A embedding method for Cyber Threat Intelligence☆22Dec 2, 2018Updated 7 years ago
- Extracting Attack Behavior from Threat Reports☆81Apr 28, 2023Updated 2 years ago
- SMET : Semantic Mapping of CVE to ATT&CK and its Application to Cybersecurity☆52Sep 14, 2024Updated last year
- Unfetter Insight performs natural language processing and analysis for text data to determine and convert to CTI Stix data automatically.☆20Sep 4, 2018Updated 7 years ago
- SecureBERT is a domain-specific language model to represent cybersecurity textual data.☆110Jul 19, 2024Updated last year
- 记录自己用的BILSTM-CRF、ELMo、BERT等来做NER任务的代码。☆27Feb 6, 2020Updated 6 years ago
- ☆24Aug 15, 2020Updated 5 years ago
- ☆10Apr 20, 2022Updated 3 years ago
- ☆41Feb 18, 2026Updated 2 weeks ago
- ☆36Jan 27, 2026Updated last month
- Python code to automatically produce a summary of a piece of text.☆12Sep 8, 2016Updated 9 years ago
- Collection of walk through, hints, notes, code snippets, tools logs and resources for vulnerable CTF-style boxes☆12Dec 3, 2025Updated 3 months ago
- ☆11Mar 31, 2022Updated 3 years ago
- ☆16May 13, 2021Updated 4 years ago
- Non-Alphanumeric JS Obfuscator☆14Aug 22, 2016Updated 9 years ago
- ☆10Jul 23, 2022Updated 3 years ago
- ☆10May 28, 2024Updated last year
- The Advanced Vulnerability Information Sharing Environment -- A Platform for CVD and PSIRT Management☆10Jan 30, 2024Updated 2 years ago
- ☆12Aug 15, 2023Updated 2 years ago
- 图像分类系统,采用HOG+SVM/Sotfmax分类器,神经网络采用卷积神经网络和34层的深度参查网络,利用基于tensorflow的tflearn实现。☆10May 23, 2017Updated 8 years ago
- With the rapid adoption of smartphones, tablets, and mobile apps, they are increasingly becoming part of children’s daily life for amusem…☆12Apr 7, 2017Updated 8 years ago
- Website for The State of FOSS in India report.☆10Aug 20, 2021Updated 4 years ago
- 🍔⌨ Zom Zom Zomato CLI tool☆10Nov 7, 2017Updated 8 years ago
- Vector Tree Ring Generator for Pen Plotting☆12Oct 16, 2023Updated 2 years ago
- "Linking Threat Tactics, Techniques, and Patterns with Defensive Weaknesses, Vulnerabilities and Affected Platform Configurations for Cyb…☆105Nov 9, 2025Updated 3 months ago
- Threat hunting in social media☆12Feb 17, 2019Updated 7 years ago