dtrizna / slp
Shell Language Processing (SLP). Pre-processing of sh/bash/zsh/.. commands for Machine Learning models.
β36Updated 7 months ago
Alternatives and similar repositories for slp:
Users that are interested in slp are comparing it to the libraries listed below
- πͺ A Database of Existing Security Vulnerabilities Patches to Enable Evaluation of Techniques (single-commit; multi-language)β38Updated last week
- SecureBERT is a domain-specific language model to represent cybersecurity textual data.β88Updated 9 months ago
- 2020 Machine Learning Security Evasion Competitionβ49Updated 4 years ago
- SMET : Semantic Mapping of CVE to ATT&CK and its Application to Cybersecurityβ46Updated 7 months ago
- β22Updated 3 years ago
- β33Updated 9 months ago
- Malware Bypass Research using Reinforcement Learningβ105Updated last year
- "Linking Threat Tactics, Techniques, and Patterns with Defensive Weaknesses, Vulnerabilities and Affected Platform Configurations for Cybβ¦β92Updated 9 months ago
- β76Updated 2 years ago
- Automated Yara Rule generation using Biclusteringβ66Updated 3 years ago
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reportsβ148Updated 2 years ago
- β15Updated 3 years ago
- User and Entity Behavior Analytics by deep learningβ109Updated 4 years ago
- An ever-growing list of resources for data-driven vulnerability assessment and prioritizationβ123Updated 2 years ago
- Security ML models encoded as Yara rulesβ214Updated last year
- GPT-3 use cases for Cybersecurityβ52Updated last year
- β106Updated 4 years ago
- A logic-based enterprise network security analyzerβ124Updated 2 years ago
- [TDSC 2021] IntruSion alert-driven Attack Graph Extractor. https://ieeexplore.ieee.org/document/9557854β35Updated 9 months ago
- NVD/CVE as JSON filesβ116Updated this week
- MAB-Malware an open-source reinforcement learning framework to generate AEs for PE malware. We model this problem as a classic multi-armeβ¦β44Updated last week
- β79Updated 5 years ago
- pretrained BERT model for cyber security text, learned CyberSecurity Knowledgeβ178Updated last year
- Code for our DLS'21 paper - BODMAS: An Open Dataset for Learning based Temporal Analysis of PE Malware. BODMAS is short for Blue Hexagon β¦β80Updated last year
- A completely automated anomaly detector Zeek network flows files (conn.log).β77Updated 8 months ago
- Extracting Attack Behavior from Threat Reportsβ76Updated last year
- Dataset contains several benign and attacks samples which can be used as values in HTTP protocol.β46Updated 4 years ago
- An extended version of SecureBERT, trained on top of both base and large version of RoBERTa using 10 GB cybersecurity-related dataβ24Updated last year
- Towards the Detection of Inconsistencies in Public Security Vulnerability Reportsβ75Updated 2 years ago
- All necessary code in order to feed Sysmon data into Recurrent Neural Networkβ17Updated 4 years ago