SECURE: Benchmarking Generative Large Language Models as a Cyber Advisory
☆17Aug 28, 2024Updated last year
Alternatives and similar repositories for SECURE
Users that are interested in SECURE are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆36Jan 27, 2026Updated last month
- A Knowledge Graph for Open Source Security Tools☆18Aug 15, 2023Updated 2 years ago
- ☆12Jan 16, 2023Updated 3 years ago
- CREME: A toolchain of automatic dataset collection for machine learning in intrusion detection☆16Sep 30, 2023Updated 2 years ago
- A network discrete event simulator for peer-to-peer network modeling.☆13Sep 1, 2019Updated 6 years ago
- Some personal work on DARPA TC engagement5☆21Aug 7, 2023Updated 2 years ago
- Implementation of the paper: "Anomaly Detection in Continuous-Time Temporal Provenance Graphs". The code follows the CTDG framework https…☆21Nov 22, 2023Updated 2 years ago
- ☆19Nov 27, 2023Updated 2 years ago
- A cybersecurity dataset consisting of 4.3 million entries of Twitter, Blogs, Paper, and CVEs☆20May 26, 2023Updated 2 years ago
- Official repository for MalKG☆24Feb 12, 2021Updated 5 years ago
- Generative AI-based CyberSecurity-focused Prompt Dataset for Benchmarking Large Language Models☆35Jan 14, 2025Updated last year
- Artifact of PrivAnalyzer as described in the Usenix 2022 paper "PrivGuard: Privacy Regulation Compliance Made Easier"☆13Nov 24, 2021Updated 4 years ago
- ☆17Oct 19, 2023Updated 2 years ago
- A comprehensive and accurate emulation of Bitcoin network implementation☆14Nov 1, 2022Updated 3 years ago
- Scripts for importing threat feeds and CTI articles, blogs, and reports into MISP.☆18Jun 16, 2025Updated 9 months ago
- A labeled dataset used for the knowledge graph construction.☆34Nov 30, 2023Updated 2 years ago
- This is a project source for NER in cybersecurity threat intelligence☆22Jul 4, 2022Updated 3 years ago
- ☆27Sep 15, 2024Updated last year
- A meta-list of public references to threat actor profiles and APT group datasets.☆76Oct 2, 2025Updated 5 months ago
- EMNLP 22' (Oral): SQUIRE: A Sequence-to-sequence Framework for Multi-hop Knowledge Graph Reasoning☆35Jun 8, 2023Updated 2 years ago
- [ICLR 2024] EX-Graph: A Pioneering Dataset Bridging Ethereum and X https://openreview.net/pdf?id=juE0rWGCJW☆23Sep 30, 2024Updated last year
- Package wifiqr implements support for generating WiFi QR codes. MIT Licensed.☆13Oct 1, 2024Updated last year
- ☆15Aug 14, 2024Updated last year
- Advanced Shodan-based scanner for discovering, verifying, and enumerating Model Context Protocol (MCP) servers and AI infrastructure tool…☆38Mar 12, 2026Updated last week
- ☆26Aug 27, 2025Updated 6 months ago
- GenAI-STIX2.1-Generator is a tool that leverages Azure OpenAI capabilities to transform threat intelligence reports from unstructured web…☆24Mar 24, 2025Updated 11 months ago
- A tool for extracting, modifying, and crafting ASDM binary packages (CVE-2022-20829)☆13Aug 15, 2022Updated 3 years ago
- ☆80Feb 11, 2026Updated last month
- groupcache is a caching and cache-filling library, intended as a replacement for memcached in many cases.☆11Apr 3, 2024Updated last year
- Joe Zbiciak Intellivision Emulator☆14May 25, 2014Updated 11 years ago
- This is an implementation of the Language Server Protocol for Jimple. It enables your IDE to provide code exploring features while workin…☆12Dec 15, 2023Updated 2 years ago
- Official Implementation of implicit reference attack☆11Oct 16, 2024Updated last year
- ☆23Jan 25, 2020Updated 6 years ago
- GAM Scripts that we use for IEEE☆23Oct 4, 2022Updated 3 years ago
- [USENIX'25] HateBench: Benchmarking Hate Speech Detectors on LLM-Generated Content and Hate Campaigns☆13Mar 1, 2025Updated last year
- Source codes involved in data analysis.☆20Sep 25, 2016Updated 9 years ago
- ☆15Oct 8, 2025Updated 5 months ago
- Code for running forward and backward versions of GPT2☆10Nov 20, 2021Updated 4 years ago
- CVE2ATT&CK: BERT-based mapping of CVEs to MITRE ATT&CK Techniques☆21Aug 24, 2022Updated 3 years ago