annotated dataset of cyber-security related tweets
☆22May 10, 2021Updated 4 years ago
Alternatives and similar repositories for cybertweets
Users that are interested in cybertweets are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This repository holds the dataset used to conduct experiments for the "Cyberthreat Detection from Twitter using Deep Neural Networks" acc…☆31Jul 15, 2020Updated 5 years ago
- This repository holds the data, source code and resulting model weights for the paper "Towards end-to-end Cyberthreat Detection from Twit…☆17Sep 14, 2021Updated 4 years ago
- Working Memory Attack on LLMs☆17May 27, 2025Updated 10 months ago
- EagleEye: Transformer-based malware detection - https://ieeexplore.ieee.org/document/10896250☆16Mar 12, 2025Updated last year
- ☆25Dec 4, 2020Updated 5 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- TaCo: Enhancing Cross-Lingual Transfer for Low-Resource Languages in LLMs through Translation-Assisted Chain-of-Thought Processes☆14Jul 1, 2025Updated 8 months ago
- RevLLM -- Reverse Engineering Tools for Large Language Models☆20Feb 29, 2024Updated 2 years ago
- ☆14May 22, 2017Updated 8 years ago
- network security named entity recognition, Chinese☆11Aug 27, 2019Updated 6 years ago
- Threat Detection System using Hybrid (Machine Learning + Lexical Analysis) learning Approach.☆11May 30, 2017Updated 8 years ago
- ☆10Mar 22, 2019Updated 7 years ago
- Instructions and tools to use data from engagement 5 of Darpa Transparent Computing Program☆26Aug 13, 2021Updated 4 years ago
- TTPDrill focuses on developing automated and context-aware analytics of cyber threat intelligence to accurately learn attack patterns (TT…☆28May 29, 2020Updated 5 years ago
- Materials for a course based on the Practical Malware Analysis text by Andrew Honig and Michael Sikorski☆19Jan 4, 2019Updated 7 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Unofficial implementation of "Backdooring Instruction-Tuned Large Language Models with Virtual Prompt Injection"☆27Jul 6, 2024Updated last year
- Plugins written for CVE-Search☆27Apr 16, 2021Updated 4 years ago
- ☆11Nov 5, 2018Updated 7 years ago
- A PyTorch implementation of Dynamic Bernoulli Embeddings☆13Dec 26, 2022Updated 3 years ago
- On-Premises Open Cyber Threat Intelligence Platform☆11Oct 29, 2024Updated last year
- A dataset containing APT group related articles and MITRE ATT&CK technique descriptions☆18Aug 14, 2019Updated 6 years ago
- Turn a supported list of filetypes (e.g. .docx) into a markdown structured text file. Also optionally defangs indicators and extract text…☆12Mar 17, 2026Updated last week
- KRYSTAL: Knowledge Graph-based Framework for Tactical Attack Discovery in Audit Data☆41Apr 25, 2024Updated last year
- 乐谱☆20Apr 16, 2019Updated 6 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Machine Learning For Cybersecurity.☆71Nov 9, 2019Updated 6 years ago
- MISP sighting server is a fast sighting server to store and look-up sightings on attributes (network indicators, file hashes, system indi…☆15Dec 24, 2023Updated 2 years ago
- 本仓主要实现并解决基于预训练bert,预训练字向量和词向量实现Bert_RCNN用于一个长文本对应对个标签的问题☆19Jun 9, 2021Updated 4 years ago
- Validate IOC from MISP ; Export results and iocs to SIEM and sensors using syslog and CEF format☆14Sep 13, 2016Updated 9 years ago
- Code Implementation of TDS Article "Semi-supervised Intent Classification with GAN-BERT"☆14Aug 19, 2020Updated 5 years ago
- Simple command line integration to Chat GPT☆11Jan 23, 2023Updated 3 years ago
- Scraping darknet forums has been the object of research in the field of intelligence and security informatics. In this repository we scr…☆11May 18, 2023Updated 2 years ago
- A word2vec model trained over Vulners☆16Jan 3, 2022Updated 4 years ago
- Sighting DB is designed to scale writing and reading a count of attributes, tracking when if was first and last seen☆17Apr 11, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- SACTI - Securely aggregate CTI sightings and report them on MISP☆14Oct 24, 2022Updated 3 years ago
- String extraction and classification tool for binary files, designed to extract only the strings that can be considered relevant (i.e. no…☆11Aug 9, 2020Updated 5 years ago
- Tool to extract indicators of compromise from security reports in PDF format☆35Mar 5, 2016Updated 10 years ago
- A bash script that can scan a target host or a list of target hosts looking for open/closed ports using netcat or telnet.☆14Feb 11, 2023Updated 3 years ago
- Tools that run inside the guest☆11Jan 2, 2020Updated 6 years ago
- Easy way to create a MISP event related to a Phishing page☆17May 31, 2023Updated 2 years ago
- Corpus of auto-labeled text for the cyber security domain☆97Nov 27, 2019Updated 6 years ago