aiforsec / SECURELinks
SECURE: Benchmarking Generative Large Language Models as a Cyber Advisory
☆13Updated 11 months ago
Alternatives and similar repositories for SECURE
Users that are interested in SECURE are comparing it to the libraries listed below
Sorting:
- ☆55Updated 10 months ago
- SMET : Semantic Mapping of CVE to ATT&CK and its Application to Cybersecurity☆47Updated 10 months ago
- pretrained BERT model for cyber security text, learned CyberSecurity Knowledge☆184Updated 2 years ago
- SecureBERT is a domain-specific language model to represent cybersecurity textual data.☆97Updated last year
- ☆35Updated last year
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆157Updated 2 years ago
- CyberGym is a large-scale, high-quality cybersecurity evaluation framework designed to rigorously assess the capabilities of AI agents on…☆49Updated last week
- The D-CIPHER and NYU CTF baseline LLM Agents built for NYU CTF Bench☆91Updated 2 weeks ago
- An extended version of SecureBERT, trained on top of both base and large version of RoBERTa using 10 GB cybersecurity-related data☆27Updated last year
- ☆79Updated 2 years ago
- This is a dataset intended to train a LLM model for a completely CVE focused input and output.☆63Updated last month
- The repository of paper "HackMentor: Fine-Tuning Large Language Models for Cybersecurity".☆127Updated last year
- CyberMetric dataset☆93Updated 7 months ago
- AnnoCTR corpus for detection and linking of entities in cyber threat reports☆21Updated last year
- ☆30Updated last year
- SecLLMHolmes is a generalized, fully automated, and scalable framework to systematically evaluate the performance (i.e., accuracy and rea…☆57Updated 3 months ago
- This repository contains attack chains generated by Aurora that can be reproduced in virtual environments.☆19Updated 2 weeks ago
- An ever-growing list of resources for data-driven vulnerability assessment and prioritization☆127Updated 2 years ago
- MEGR-APT: A Memory-Efficient APT Hunting System Based on Attack Representation Learning☆49Updated 3 months ago
- An Execution Isolation Architecture for LLM-Based Agentic Systems☆86Updated 6 months ago
- CTINexus is a framework that leverages optimized in-context learning of LLMs to enable data-efficient extraction of cyber threat intellig…☆37Updated this week
- ☆65Updated 3 months ago
- VulZoo: A Comprehensive Vulnerability Intelligence Dataset | ASE 2024 Demo☆58Updated 4 months ago
- Extracting Attack Behavior from Threat Reports☆77Updated 2 years ago
- CVE2ATT&CK: BERT-based mapping of CVEs to MITRE ATT&CK Techniques☆21Updated 2 years ago
- ☆84Updated 2 years ago
- A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports☆24Updated last year
- CyberBench: A Multi-Task Cyber LLM Benchmark☆17Updated 3 months ago
- A framework for synthesizing lateral movement login data.☆25Updated 4 years ago
- Adversarial machine learning and explainable machine learning for cyber security☆11Updated 3 years ago