code-philia / PhishLLM
☆15Updated 4 months ago
Alternatives and similar repositories for PhishLLM:
Users that are interested in PhishLLM are comparing it to the libraries listed below
- This is a dataset intended to train a LLM model for a completely CVE focused input and output.☆52Updated 3 months ago
- pretrained BERT model for cyber security text, learned CyberSecurity Knowledge☆173Updated last year
- A collection of agents that use Large Language Models (LLMs) to perform tasks common on our day to day jobs in cyber security.☆86Updated 9 months ago
- An ever-growing list of resources for data-driven vulnerability assessment and prioritization☆120Updated 2 years ago
- An Execution Isolation Architecture for LLM-Based Agentic Systems☆63Updated last month
- ☆33Updated 7 months ago
- SecureBERT is a domain-specific language model to represent cybersecurity textual data.☆85Updated 7 months ago
- ☆12Updated last year
- Dynaphish: A complementary module for any reference-based phishing detector with BrandKnowledgeExpansion and WebInteraction☆14Updated 8 months ago
- CyberMetric dataset☆68Updated 2 months ago
- ☆18Updated 3 years ago
- AnnoCTR corpus for detection and linking of entities in cyber threat reports☆20Updated 10 months ago
- Open Source Tool - Cybersecurity Graph Database in Neo4j☆57Updated last year
- Machine learning on knowledge graphs for context-aware security monitoring (data and model)☆17Updated 2 years ago
- Extracting Attack Behavior from Threat Reports☆76Updated last year
- SMET : Semantic Mapping of CVE to ATT&CK and its Application to Cybersecurity☆44Updated 5 months ago
- Cyber Security concepts extracted from unstructured threat intelligence reports using Named Entity Recognition☆98Updated last year
- ☆12Updated last year
- Implementations of 3 phishing detection and identification baselines☆17Updated 3 months ago
- [USENIX Security 2024] Official Repository of 'KnowPhish: Large Language Models Meet Multimodal Knowledge Graphs for Enhancing Reference-…☆11Updated last week
- A comprehensive local Linux Privilege-Escalation Benchmark☆28Updated 3 months ago
- ☆19Updated 4 months ago
- The repository consists of : Construction of the corpus, Named Entity Recognition , Relationship Extraction , Construction of knowledge g…☆27Updated 2 years ago
- ⚡ Vigil ⚡ Detect prompt injections, jailbreaks, and other potentially risky Large Language Model (LLM) inputs☆352Updated last year
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆149Updated last year
- This project will work towards a fully-functional autonomous intelligent cyberdefense agent with increasingly advanced capabilities that …☆29Updated last month
- YAWNING TITAN is an abstract, graph based cyber-security simulation environment that supports the training of intelligent agents for auto…☆60Updated 9 months ago
- 🪐 A Database of Existing Security Vulnerabilities Patches to Enable Evaluation of Techniques (single-commit; multi-language)☆37Updated 2 years ago
- AIBugHunter: A Practical Tool for Predicting, Classifying and Repairing Software Vulnerabilities☆38Updated 10 months ago
- CVEfixes: Automated Collection of Vulnerabilities and Their Fixes from Open-Source Software☆225Updated 7 months ago