aaronkaplan / cti-llmView external linksLinks
An LLM for CTI reports - to be presented at FIRST Fukuoka 2024
☆23Jan 26, 2026Updated 2 weeks ago
Alternatives and similar repositories for cti-llm
Users that are interested in cti-llm are comparing it to the libraries listed below
Sorting:
- Interface LLMs from within MISP to extract TTPs and threat intel from CTI reports☆18Nov 13, 2023Updated 2 years ago
- a Python client to query the FIRST EPSS API☆11Sep 13, 2023Updated 2 years ago
- Applied data science in cyber security☆23Mar 21, 2022Updated 3 years ago
- ☆36Jan 27, 2026Updated 2 weeks ago
- A tutorial and resources for exploit development learners☆10Jan 25, 2021Updated 5 years ago
- A WeChat (and Weixin) chatbot skeleton in Python with queue/delayed messages support.☆12Jan 12, 2026Updated last month
- Tool to identify domains containing Pinyin language☆12Oct 18, 2014Updated 11 years ago
- Generate realistic raw datasets with optional DQ issues☆10Jan 22, 2025Updated last year
- Cybersecurity demo for Neo4j's Connections: Graphs in Cybersecurity 2021☆14May 17, 2022Updated 3 years ago
- Master PDF Summarization with Google Bard☆13Feb 29, 2024Updated last year
- Windows Shell Link (LNK) Proof of Concept☆16Jul 19, 2025Updated 6 months ago
- ☆10Jan 21, 2019Updated 7 years ago
- ☆14Sep 28, 2023Updated 2 years ago
- Community-based CybergON-powered Suricata rules☆12Jul 5, 2022Updated 3 years ago
- Reference list of email processing resources; focus on preservation and PII handling☆14Apr 20, 2022Updated 3 years ago
- TLS Tracing examples using eBPF against the OpenSSL Library☆15Jun 26, 2022Updated 3 years ago
- Analyse Social Network of co-authors in DBLP website (https://dblp.uni-trier.de) using NetworkX.☆14May 27, 2020Updated 5 years ago
- Mad (╯°□°)╯'ing☆10Nov 22, 2022Updated 3 years ago
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆19Aug 31, 2025Updated 5 months ago
- IBM iQuHACK 2024 In-Person Challenge☆13Feb 6, 2024Updated 2 years ago
- WISKESS automates the Windows evidence processing for Incident Response investigations. Rust version.☆16Oct 16, 2025Updated 3 months ago
- ☆12Feb 18, 2021Updated 4 years ago
- Unveiling Cyber Threats: From assets to Vulnerability Insights☆17Oct 22, 2024Updated last year
- Code for Rumal Backend that will interface with Thug Daemon☆11Nov 24, 2016Updated 9 years ago
- A Bro package to identify connections that are bursting (lots of data and transferring quickly).☆13Oct 15, 2020Updated 5 years ago
- All statistical models / machine learning / computer vision / financial models / NLP / PySpark / python techniques / library tutorials ca…☆11Nov 26, 2022Updated 3 years ago
- Platform aggregating suscribed electronic ressources usage statistics of the French reasearcher organizations☆11Updated this week
- A front-end framework for modular web apps☆13Mar 18, 2016Updated 9 years ago
- ☆19Dec 31, 2025Updated last month
- ☆11Sep 6, 2023Updated 2 years ago
- ⚙️ Converts NDJson format data into CSV☆21Dec 15, 2024Updated last year
- ☆13May 17, 2016Updated 9 years ago
- Code and templates required to build the DARPA open catalog.☆17Mar 23, 2016Updated 9 years ago
- Deprecated, use https://github.com/mozilla-services/iprepd☆15May 18, 2018Updated 7 years ago
- This project is an AI-powered Security Information and Event Management (SIEM) system designed for real-time threat detection and respons…☆19Nov 10, 2024Updated last year
- Stanford CoreNLP NER addon for Apache Tika's NamerEntityParser☆13Feb 26, 2022Updated 3 years ago
- Analysing World bank Data☆14Apr 14, 2019Updated 6 years ago
- Feed for verious malicious IPs such as malware and botnets☆12Jun 20, 2016Updated 9 years ago
- Vizlinc☆15Jan 14, 2016Updated 10 years ago