An LLM for CTI reports - to be presented at FIRST Fukuoka 2024
☆23Jan 26, 2026Updated 3 months ago
Alternatives and similar repositories for cti-llm
Users that are interested in cti-llm are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Interface LLMs from within MISP to extract TTPs and threat intel from CTI reports☆18Nov 13, 2023Updated 2 years ago
- This project aims to fine-tune a pre-trained LLM using CTI-specific data and evaluate its performance with CTIBench, a benchmark designed…☆19Sep 5, 2024Updated last year
- ☆36Jan 27, 2026Updated 3 months ago
- Summarize CTI reports with OpenAI☆18Updated this week
- A Knowledge Graph for Open Source Security Tools☆18Aug 15, 2023Updated 2 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Applied data science in cyber security☆23Mar 21, 2022Updated 4 years ago
- SECURE: Benchmarking Generative Large Language Models as a Cyber Advisory☆17Aug 28, 2024Updated last year
- ☆12Jan 16, 2023Updated 3 years ago
- a database that collects data related to APTs from existing public sources through a semi automatic methodology and produces an exhaustiv…☆19Nov 22, 2022Updated 3 years ago
- GenAI-STIX2.1-Generator is a tool that leverages Azure OpenAI capabilities to transform threat intelligence reports from unstructured web…☆24Mar 24, 2025Updated last year
- A small go harness that uses Ollama to orchestrate LLMs in a restricted process flow☆17Sep 10, 2024Updated last year
- Extracts IoCs, TTPs and the relationships between them. Outputs a STIX 2.1 bundle.☆81Apr 17, 2026Updated 3 weeks ago
- Some personal work on DARPA TC engagement5☆21Aug 7, 2023Updated 2 years ago
- Open Source Intelligence (OSINT) Tool List for Cyber Threat Intelligence Researchers☆23May 4, 2024Updated 2 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Implementation of the paper: "Anomaly Detection in Continuous-Time Temporal Provenance Graphs". The code follows the CTDG framework https…☆22Nov 22, 2023Updated 2 years ago
- ☆13Feb 5, 2022Updated 4 years ago
- ☆19Nov 27, 2023Updated 2 years ago
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆20Feb 13, 2026Updated 2 months ago
- Short Python script for parsing Defender VDM signature files.☆10Sep 22, 2024Updated last year
- ☆21Dec 22, 2021Updated 4 years ago
- Data breaches, Leaks, Malwares Forums List <Please Use Vpn/TOR don't click on Link directly bad OPSEC>☆60Sep 18, 2025Updated 7 months ago
- Extract machine readable cyber threat intelligence from unstructured data (inc. PDFs, Word docs, and HTML pages)☆38Apr 22, 2026Updated 2 weeks ago
- Official repository for MalKG☆24Feb 12, 2021Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Windows Shell Link (LNK) Proof of Concept☆16Jul 19, 2025Updated 9 months ago
- Public exploits☆16May 28, 2018Updated 7 years ago
- Security Blogs - A simple aggregator for security news/blog☆26Apr 29, 2026Updated last week
- The Advanced Vulnerability Information Sharing Environment -- A Platform for CVD and PSIRT Management☆10Jan 30, 2024Updated 2 years ago
- Draugnet is a lightweight, open-source tool for anonymous cyber threat reporting. Built for the MISP ecosystem, it lets users submit and …☆20Mar 24, 2026Updated last month
- ☆83Updated this week
- ☆89Jan 4, 2023Updated 3 years ago
- A labeled dataset used for the knowledge graph construction.☆34Nov 30, 2023Updated 2 years ago
- A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports☆32Aug 21, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Training scenarios for cyber ranges☆15Apr 24, 2020Updated 6 years ago
- A web application for generating, parsing and validating, manipulating, visualizing and executing CACAO v2.0 playbooks.☆40Aug 27, 2025Updated 8 months ago
- Analyse Social Network of co-authors in DBLP website (https://dblp.uni-trier.de) using NetworkX.☆13May 27, 2020Updated 5 years ago
- Reference sheet for Threat Hunting Professional Course☆26Mar 10, 2019Updated 7 years ago
- ☆27Jun 25, 2021Updated 4 years ago
- Turn any blog into structured threat intelligence.☆57Updated this week
- IBM iQuHACK 2024 In-Person Challenge☆14Feb 6, 2024Updated 2 years ago