behzadanksu / cybertweets
annotated dataset of cyber-security related tweets
☆22Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for cybertweets
- This repository holds the dataset used to conduct experiments for the "Cyberthreat Detection from Twitter using Deep Neural Networks" acc…☆30Updated 4 years ago
- A tool to extract structured cyber information from incident reports.☆78Updated 6 years ago
- A python app to predict Att&ck tactics and techniques from cyber threat reports☆116Updated last year
- ☆17Updated 2 years ago
- A collection of resources for security data☆40Updated 7 years ago
- Cyber Security concepts extracted from unstructured threat intelligence reports using Named Entity Recognition☆91Updated last year
- Definition, description and relationship types of MISP objects☆92Updated last week
- Collection of data sources that can be used to provide context to security events☆25Updated 9 years ago
- Tool to extract indicators of compromise from security reports in PDF format☆72Updated 5 months ago
- Tools to interact with APTnotes reporting/index.☆97Updated 4 years ago
- A web application for generating, parsing and validating, manipulating, and visualizing CACAO v2.0 playbooks.☆24Updated 8 months ago
- Example code for our book Introduction to Artificial Intelligence for Security Professionals☆150Updated 5 years ago
- Unfetter Insight performs natural language processing and analysis for text data to determine and convert to CTI Stix data automatically.☆19Updated 6 years ago
- Translate STIX 2 Patterning Queries☆30Updated 6 years ago
- Merge of two major cyber adversary datasets, MITRE ATT&CK and ETDA/ThaiCERT Threat Actor Cards, enabling victim/motivation-adversary-tech…☆50Updated 2 years ago
- A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports☆19Updated last year
- OASIS TC Open Repository: Match STIX content against STIX patterns☆44Updated 2 years ago
- OASIS TC Open Repository: Validator for STIX 2.0 JSON normative requirements and best practices☆50Updated 2 weeks ago
- OASIS TC Open Repository: GitHub Pages site for STIX and TAXII☆94Updated 3 weeks ago
- Tool to extract indicators of compromise from security reports in PDF format☆429Updated last year
- Simple, effective, and modular package for parsing observables (indicators of compromise (IOCs), network data, and other, security relate…☆158Updated last year
- Security ML models encoded as Yara rules☆211Updated last year
- Graph Representation of MITRE ATT&CK's CTI data☆48Updated 5 years ago
- ☆44Updated 6 years ago
- This repository holds the data, source code and resulting model weights for the paper "Towards end-to-end Cyberthreat Detection from Twit…☆16Updated 3 years ago
- Collection of cyber security and "AI" relevant topics☆75Updated 6 years ago
- Graphics, icons, and diagrams to support STIX 2☆42Updated 3 years ago
- Extracting Attack Behavior from Threat Reports☆75Updated last year