An LLM for CTI reports - to be presented at FIRST Fukuoka 2024
☆23Jan 26, 2026Updated 2 months ago
Alternatives and similar repositories for cti-llm
Users that are interested in cti-llm are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Interface LLMs from within MISP to extract TTPs and threat intel from CTI reports☆18Nov 13, 2023Updated 2 years ago
- This project aims to fine-tune a pre-trained LLM using CTI-specific data and evaluate its performance with CTIBench, a benchmark designed…☆17Sep 5, 2024Updated last year
- a Python client to query the FIRST EPSS API☆11Sep 13, 2023Updated 2 years ago
- ☆36Jan 27, 2026Updated 2 months ago
- A Knowledge Graph for Open Source Security Tools☆18Aug 15, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆12Feb 18, 2021Updated 5 years ago
- Applied data science in cyber security☆23Mar 21, 2022Updated 4 years ago
- a database that collects data related to APTs from existing public sources through a semi automatic methodology and produces an exhaustiv…☆18Nov 22, 2022Updated 3 years ago
- SECURE: Benchmarking Generative Large Language Models as a Cyber Advisory☆17Aug 28, 2024Updated last year
- GenAI-STIX2.1-Generator is a tool that leverages Azure OpenAI capabilities to transform threat intelligence reports from unstructured web…☆24Mar 24, 2025Updated last year
- A small go harness that uses Ollama to orchestrate LLMs in a restricted process flow☆17Sep 10, 2024Updated last year
- Extracts IoCs, TTPs and the relationships between them. Outputs a STIX 2.1 bundle.☆79Updated this week
- Some personal work on DARPA TC engagement5☆21Aug 7, 2023Updated 2 years ago
- Master PDF Summarization with Google Bard☆13Feb 29, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Open Source Intelligence (OSINT) Tool List for Cyber Threat Intelligence Researchers☆23May 4, 2024Updated last year
- Implementation of the paper: "Anomaly Detection in Continuous-Time Temporal Provenance Graphs". The code follows the CTDG framework https…☆21Nov 22, 2023Updated 2 years ago
- ☆21Dec 22, 2021Updated 4 years ago
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆20Feb 13, 2026Updated 2 months ago
- Short Python script for parsing Defender VDM signature files.☆10Sep 22, 2024Updated last year
- Data breaches, Leaks, Malwares Forums List <Please Use Vpn/TOR don't click on Link directly bad OPSEC>☆61Sep 18, 2025Updated 7 months ago
- Extract machine readable cyber threat intelligence from unstructured data (inc. PDFs, Word docs, and HTML pages)☆38Updated this week
- Complete translation (EN) of the leaked files related to Conti (chat)☆17Jan 19, 2023Updated 3 years ago
- Official repository for MalKG☆24Feb 12, 2021Updated 5 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Windows Shell Link (LNK) Proof of Concept☆16Jul 19, 2025Updated 9 months ago
- Security Blogs - A simple aggregator for security news/blog☆25Mar 31, 2026Updated 2 weeks ago
- ☆82Mar 17, 2026Updated last month
- The Advanced Vulnerability Information Sharing Environment -- A Platform for CVD and PSIRT Management☆10Jan 30, 2024Updated 2 years ago
- Draugnet is a lightweight, open-source tool for anonymous cyber threat reporting. Built for the MISP ecosystem, it lets users submit and …☆20Mar 24, 2026Updated 3 weeks ago
- ☆89Jan 4, 2023Updated 3 years ago
- A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports☆30Aug 21, 2023Updated 2 years ago
- A labeled dataset used for the knowledge graph construction.☆34Nov 30, 2023Updated 2 years ago
- Training scenarios for cyber ranges☆15Apr 24, 2020Updated 5 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Jun 5, 2023Updated 2 years ago
- A web application for generating, parsing and validating, manipulating, visualizing and executing CACAO v2.0 playbooks.☆39Aug 27, 2025Updated 7 months ago
- ☆27Jun 25, 2021Updated 4 years ago
- Analyse Social Network of co-authors in DBLP website (https://dblp.uni-trier.de) using NetworkX.☆14May 27, 2020Updated 5 years ago
- Reference sheet for Threat Hunting Professional Course☆26Mar 10, 2019Updated 7 years ago
- Turn any blog into structured threat intelligence.☆55Updated this week
- IBM iQuHACK 2024 In-Person Challenge☆14Feb 6, 2024Updated 2 years ago