dtrizna / slp
Shell Language Processing (SLP). Pre-processing of sh/bash/zsh/.. commands for Machine Learning models.
☆34Updated 2 months ago
Related projects ⓘ
Alternatives and complementary repositories for slp
- Automated Yara Rule generation using Biclustering☆60Updated 3 years ago
- 2020 Machine Learning Security Evasion Competition☆49Updated 4 years ago
- ☆19Updated 3 years ago
- Malware Bypass Research using Reinforcement Learning☆102Updated 7 months ago
- Security ML models encoded as Yara rules☆211Updated last year
- SecureBERT is a domain-specific language model to represent cybersecurity textual data.☆71Updated 4 months ago
- "Linking Threat Tactics, Techniques, and Patterns with Defensive Weaknesses, Vulnerabilities and Affected Platform Configurations for Cyb…☆87Updated 4 months ago
- ☆73Updated last year
- Code for shelLM tool☆46Updated 3 weeks ago
- Analysis of HTTP traffic and detection of anomalous user behavior in allowed actions. UEBA system.☆21Updated last year
- GPT-3 use cases for Cybersecurity☆51Updated last year
- 🧠 🦠 An artificial neural network and API to detect Windows malware, based on Ergo and LIEF.☆175Updated 5 years ago
- This is a project of "Cybersecurity Event Detection with New and Re-emerging Words". (ASIACCS 2020)☆28Updated 7 months ago
- NVD/CVE as JSON files☆107Updated this week
- malicious PowerShell script detection model☆36Updated 3 years ago
- SysFlow documentation and issues tracker☆45Updated last month
- 🪐 A Database of Existing Security Vulnerabilities Patches to Enable Evaluation of Techniques (single-commit; multi-language)☆36Updated last year
- ☆75Updated 4 years ago
- 利用预训练语言模型从非结构化威胁报告中提取 MITRE ATT&CK TTP 信息☆71Updated last year
- A logic-based enterprise network security analyzer☆110Updated last year
- An easy ATT&CK-based Sysmon hunting tool, showing in Blackhat USA 2019 Arsenal☆202Updated 2 years ago
- ☆96Updated 4 years ago
- An ever-growing list of resources for data-driven vulnerability assessment and prioritization☆113Updated last year
- SMET : Semantic Mapping of CVE to ATT&CK and its Application to Cybersecurity☆36Updated 2 months ago
- A python app to predict Att&ck tactics and techniques from cyber threat reports☆116Updated last year
- MAB-Malware an open-source reinforcement learning framework to generate AEs for PE malware. We model this problem as a classic multi-arme…☆40Updated last year
- PyPI malware packages☆58Updated 5 years ago
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆137Updated last year
- Code for Benchmarking two ML Approaches performing Authorship Attribution☆35Updated 2 years ago
- Build a local copy of CPE(Common Platform Enumeration)☆93Updated last week