An LLM for CTI reports - to be presented at FIRST Fukuoka 2024
☆23Jan 26, 2026Updated last month
Alternatives and similar repositories for cti-llm
Users that are interested in cti-llm are comparing it to the libraries listed below
Sorting:
- Interface LLMs from within MISP to extract TTPs and threat intel from CTI reports☆18Nov 13, 2023Updated 2 years ago
- a Python client to query the FIRST EPSS API☆11Sep 13, 2023Updated 2 years ago
- Applied data science in cyber security☆23Mar 21, 2022Updated 3 years ago
- ☆36Jan 27, 2026Updated last month
- A WeChat (and Weixin) chatbot skeleton in Python with queue/delayed messages support.☆12Jan 12, 2026Updated last month
- ☆16Jul 8, 2024Updated last year
- The Advanced Vulnerability Information Sharing Environment -- A Platform for CVD and PSIRT Management☆10Jan 30, 2024Updated 2 years ago
- A tutorial and resources for exploit development learners☆10Jan 25, 2021Updated 5 years ago
- HoneyDB Python Module☆14Feb 6, 2024Updated 2 years ago
- Generate a table of contents from the comments of a file☆13Jan 24, 2026Updated last month
- IBM iQuHACK 2024 In-Person Challenge☆13Feb 6, 2024Updated 2 years ago
- Mad (╯°□°)╯'ing☆10Nov 22, 2022Updated 3 years ago
- ☆10Jan 21, 2019Updated 7 years ago
- A small go harness that uses Ollama to orchestrate LLMs in a restricted process flow☆16Sep 10, 2024Updated last year
- Windows Shell Link (LNK) Proof of Concept☆16Jul 19, 2025Updated 7 months ago
- Generate realistic raw datasets with optional DQ issues☆10Jan 22, 2025Updated last year
- Analyse Social Network of co-authors in DBLP website (https://dblp.uni-trier.de) using NetworkX.☆14May 27, 2020Updated 5 years ago
- Cybersecurity demo for Neo4j's Connections: Graphs in Cybersecurity 2021☆14May 17, 2022Updated 3 years ago
- Reference list of email processing resources; focus on preservation and PII handling☆14Apr 20, 2022Updated 3 years ago
- A list of backdoor samples I find online.☆13Dec 16, 2019Updated 6 years ago
- ☆14Sep 28, 2023Updated 2 years ago
- Community-based CybergON-powered Suricata rules☆12Jul 5, 2022Updated 3 years ago
- Pattern-of-Behavior Search Tool☆11Jun 20, 2022Updated 3 years ago
- Security Blogs - A simple aggregator for security news/blog☆24Jan 19, 2026Updated last month
- This project is an AI-powered Security Information and Event Management (SIEM) system designed for real-time threat detection and respons…☆20Nov 10, 2024Updated last year
- Platform aggregating suscribed electronic ressources usage statistics of the French reasearcher organizations☆11Mar 3, 2026Updated last week
- A front-end framework for modular web apps☆13Mar 18, 2016Updated 9 years ago
- Unveiling Cyber Threats: From assets to Vulnerability Insights☆17Oct 22, 2024Updated last year
- ⚙️ Converts NDJson format data into CSV☆21Dec 15, 2024Updated last year
- A Bro package to identify connections that are bursting (lots of data and transferring quickly).☆13Oct 15, 2020Updated 5 years ago
- Analysing World bank Data☆14Apr 14, 2019Updated 6 years ago
- WISKESS automates the Windows evidence processing for Incident Response investigations. Rust version.☆16Oct 16, 2025Updated 4 months ago
- TLS Tracing examples using eBPF against the OpenSSL Library☆16Jun 26, 2022Updated 3 years ago
- Feed for verious malicious IPs such as malware and botnets☆12Jun 20, 2016Updated 9 years ago
- ☆11Sep 6, 2023Updated 2 years ago
- Debian and Red Hat packaging for SIE DNS sensor☆15May 5, 2023Updated 2 years ago
- Deprecated, use https://github.com/mozilla-services/iprepd☆15May 18, 2018Updated 7 years ago
- ☆12Jan 16, 2023Updated 3 years ago
- Master Kali Linux, Excel in Offensive Security☆32Jun 15, 2025Updated 8 months ago