behzadanksu / cybertweets
annotated dataset of cyber-security related tweets
☆22Updated 3 years ago
Alternatives and similar repositories for cybertweets:
Users that are interested in cybertweets are comparing it to the libraries listed below
- A tool to extract structured cyber information from incident reports.☆80Updated 6 years ago
- This repository holds the dataset used to conduct experiments for the "Cyberthreat Detection from Twitter using Deep Neural Networks" acc…☆31Updated 4 years ago
- A collection of resources for security data☆40Updated 7 years ago
- Unfetter Insight performs natural language processing and analysis for text data to determine and convert to CTI Stix data automatically.☆19Updated 6 years ago
- Cyber Security concepts extracted from unstructured threat intelligence reports using Named Entity Recognition☆97Updated last year
- ☆18Updated 3 years ago
- Definition, description and relationship types of MISP objects☆94Updated this week
- A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports☆24Updated last year
- A python app to predict Att&ck tactics and techniques from cyber threat reports☆118Updated last year
- Tools to interact with APTnotes reporting/index.☆99Updated 4 years ago
- A Corpus of Data from Various Cybersecurity Blogs☆13Updated 2 years ago
- Cyber Threat Intelligence - Toolbox☆51Updated 6 years ago
- A web application for generating, parsing and validating, manipulating, and visualizing CACAO v2.0 playbooks.☆25Updated 2 months ago
- OASIS Cyber Threat Intelligence (CTI) TC: A tool for generating STIX content for prototyping and testing. https://github.com/oasis-open/c…☆41Updated 10 months ago
- ☆25Updated last year
- Corpus of auto-labeled text for the cyber security domain☆93Updated 5 years ago
- OASIS TC Open Repository: Non-normative schemas and examples for STIX 2☆119Updated 3 months ago
- Tool to extract indicators of compromise from security reports in PDF format☆71Updated 8 months ago
- Simple, effective, and modular package for parsing observables (indicators of compromise (IOCs), network data, and other, security relate…☆165Updated last year
- OASIS TC Open Repository: Match STIX content against STIX patterns☆44Updated 2 years ago
- A utility repo to assist with converting between MISP and STIX formats☆67Updated 4 years ago
- A completely automated anomaly detector Zeek network flows files (conn.log).☆75Updated 6 months ago
- ☆75Updated last year
- Cyber-investigation Analysis Standard Expression (CASE) Ontology☆67Updated last week
- This repository holds the data, source code and resulting model weights for the paper "Towards end-to-end Cyberthreat Detection from Twit…☆17Updated 3 years ago
- OASIS TC Open Repository: Validator for STIX 2.0 JSON normative requirements and best practices☆51Updated 2 months ago
- Example code for our book Introduction to Artificial Intelligence for Security Professionals☆151Updated 6 years ago
- Imports Alienvault OTX pulses to a MISP instance☆52Updated 3 years ago
- A project to label the VirusShare malware corpus using VirusTotal's public API.☆30Updated last year
- IOC (Indicator of Compromise) Extractor: a program to help extract IOCs from text files.☆135Updated 9 years ago