☆25Jul 12, 2023Updated 2 years ago
Alternatives and similar repositories for IEEEEuroSP23
Users that are interested in IEEEEuroSP23 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- network security named entity recognition, Chinese☆11Aug 27, 2019Updated 6 years ago
- A STIX 2.1 Extension Definition for the Course of Action (COA) object type. The nested property extension allows a COA to share machine-r…☆23Dec 11, 2023Updated 2 years ago
- ☆86Mar 29, 2023Updated 3 years ago
- ☆44Apr 29, 2020Updated 5 years ago
- ☆36Jan 27, 2026Updated 2 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- This repository includes a mapping table and a reference process that allows converting between STIX 2.1 Course of Action objects that ma…☆16Aug 24, 2022Updated 3 years ago
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆182Mar 23, 2023Updated 3 years ago
- Create a cool process tree like https://twitter.com/ACEResponder.☆35Mar 1, 2023Updated 3 years ago
- ☆25Jun 11, 2021Updated 4 years ago
- Dettectinator - The Python library to your DeTT&CT YAML files.☆118Jan 22, 2026Updated 2 months ago
- A repository with data about APTs☆13Nov 24, 2022Updated 3 years ago
- ☆12Jul 15, 2022Updated 3 years ago
- ☆12Feb 24, 2023Updated 3 years ago
- Extracts IoCs, TTPs and the relationships between them. Outputs a STIX 2.1 bundle.☆79Mar 17, 2026Updated last week
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- MISP-STIX-Converter - Python library to handle the conversion between MISP and STIX formats☆56Updated this week
- OASIS Cyber Threat Intelligence (CTI) TC Open Repository: Convert STIX 1.2 XML to STIX 2.x JSON☆52Apr 15, 2024Updated last year
- ☆13Jun 26, 2023Updated 2 years ago
- Replication package for the paper "Automatic Mapping of Unstructured Cyber Threat Intelligence: An Experimental Study" published at the I…☆57Aug 29, 2022Updated 3 years ago
- provides a new dataset for NER missions in cyber threat intelligence (CTI) field.☆42Aug 3, 2022Updated 3 years ago
- ☆11May 3, 2019Updated 6 years ago
- ☆89Jan 4, 2023Updated 3 years ago
- Common framework for designing a detection and response framework for the most common MFT solutions☆16Aug 4, 2023Updated 2 years ago
- ☆10Aug 27, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- bert-flat 简化版 添加了很多注释☆15Nov 25, 2021Updated 4 years ago
- ☆23Apr 1, 2025Updated 11 months ago
- Defense from the 2020 Microsoft Evasion Competition☆17Apr 27, 2021Updated 4 years ago
- EasyTier for HarmonyOS NEXT☆16Oct 14, 2025Updated 5 months ago
- ☆12Jun 11, 2021Updated 4 years ago
- a hackbot proof-of-concept☆41Feb 24, 2024Updated 2 years ago
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Feb 6, 2024Updated 2 years ago
- A full analysis report detailing as much as possible of a Malware or a Threat☆31Jan 30, 2026Updated 2 months ago
- ☆10Oct 17, 2020Updated 5 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Material from the DARPA Transparent Computing Program☆229Apr 29, 2020Updated 5 years ago
- ANOMULY is a general, unsupervised edge anomaly detection framework for multiplex dynamic networks.☆11May 19, 2023Updated 2 years ago
- ☆137Jun 17, 2020Updated 5 years ago
- Attack Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by devel…☆722Nov 14, 2025Updated 4 months ago
- 实体关系抽取,使用了百度比赛的数据集。使用pytorch实现MultiHeadJointEntityRelationExtraction,包含Bert、Albert、gru的使用,并且添加了对抗训练。最后使用Flask和Neo4j图数据库对模型进行了部署☆125Apr 22, 2023Updated 2 years ago
- [deprecated] 坦克动荡☆10Jul 21, 2021Updated 4 years ago
- Materials for a course based on the Practical Malware Analysis text by Andrew Honig and Michael Sikorski☆19Jan 4, 2019Updated 7 years ago