An extended version of SecureBERT, trained on top of both base and large version of RoBERTa using 10 GB cybersecurity-related data
☆32Jan 26, 2024Updated 2 years ago
Alternatives and similar repositories for SecureBERT-plus
Users that are interested in SecureBERT-plus are comparing it to the libraries listed below
Sorting:
- Source code of "TRAP: Targeted Random Adversarial Prompt Honeypot for Black-Box Identification", ACL2024 (findings)☆14Nov 20, 2024Updated last year
- ☆36Jan 27, 2026Updated last month
- ☆36Feb 26, 2026Updated 3 weeks ago
- pretrained BERT model for cyber security text, learned CyberSecurity Knowledge☆208Apr 28, 2023Updated 2 years ago
- SMET : Semantic Mapping of CVE to ATT&CK and its Application to Cybersecurity☆52Sep 14, 2024Updated last year
- OWASP Foundation web repository☆59Updated this week
- Packet Construction Set☆10Nov 20, 2017Updated 8 years ago
- Official code for the paper entitled "Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense"☆15Apr 10, 2025Updated 11 months ago
- ☆12Jun 19, 2024Updated last year
- Securix Main repository including installer and controll scripts☆14May 14, 2020Updated 5 years ago
- Tools related to work with Attack Flow (https://github.com/center-for-threat-informed-defense/attack-flow)☆44Jun 6, 2022Updated 3 years ago
- This repository includes code for the paper "Towards Zero Touch Networks: Cross-Layer Automated Security Solutions for 6G Wireless Networ…☆14Mar 5, 2025Updated last year
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆19Mar 3, 2022Updated 4 years ago
- LLM agent that autonomously hacks websites☆14May 30, 2024Updated last year
- This project is a deliberately vulnerable environment to learn about LLM-specific risks based on the OWASP Top 10 for LLM Applications.☆52Jan 19, 2026Updated 2 months ago
- ADD extracts features from patches such as repair patterns.☆13Oct 2, 2023Updated 2 years ago
- WAF Environment for OpenAI Gym☆15Dec 13, 2020Updated 5 years ago
- The Shodan MCP Server by ADEO Cybersecurity Services provides cybersecurity professionals with streamlined access to Shodan's powerful re…☆21Mar 22, 2025Updated last year
- ☆10Aug 27, 2022Updated 3 years ago
- 根据语法规则生成模拟句子☆12Jan 21, 2019Updated 7 years ago
- Probing pre-trained source code models☆15Apr 27, 2022Updated 3 years ago
- Implementation of trajectory outlier detection methods in C++/Qt5. This methods are TRAOD and iBoat☆13May 28, 2017Updated 8 years ago
- 这个仓库包含了我在上人工智能课时完成的拼音输入法作业。☆11Feb 16, 2022Updated 4 years ago
- Sample pipeline demo highlighting how to integrate Falcon Container Sensor into ECS Fargate Workloads☆11Nov 15, 2024Updated last year
- A Python library for processing and filtering TabLib☆13Aug 24, 2024Updated last year
- Point of Concept: To help to automate the collection of evidence for SOC 2 Audits and etc.☆11May 13, 2024Updated last year
- ☆14Feb 26, 2025Updated last year
- MDG-based static vulnerability scanner specialized in analyzing npm packages and detecting taint-style and prototype pollution vulnerabil…☆24Dec 10, 2025Updated 3 months ago
- The official implementation for Common Sense Enhanced Knowledge-based Recommendation with Large Language Model☆14Apr 21, 2024Updated last year
- OWASP Web Security Testing Guide RAG system with ChromaDB, MCP for Claude Code☆19Dec 11, 2025Updated 3 months ago
- JSON API for ExploitDB Website☆17Jan 11, 2015Updated 11 years ago
- 词、句拼音转汉字、拼音分割、拼音补全、pygame输入中文☆15Mar 21, 2020Updated 6 years ago
- SimCSE☆15Oct 1, 2022Updated 3 years ago
- This repo contains the codes and the notebooks used for the paper "DarkVec: Automatic Analysis of Darknet Traffic with Word Embeddings".☆13Feb 3, 2024Updated 2 years ago
- A security-first MCP server empowering AI agents to orchestrate Ghidra, Radare2, and YARA for automated reverse engineering.☆50Mar 13, 2026Updated last week
- Usenix Security'23☆16Feb 14, 2023Updated 3 years ago
- A Theano implementation of a CNN DSEBM (deep structured energy-based model) described in https://arxiv.org/pdf/1605.07717v2.pdf☆10Oct 13, 2016Updated 9 years ago
- Scripts for downloading, preprocessing, and numpy-ifying popular machine learning datasets☆11Jan 2, 2025Updated last year
- Cyber Security concepts extracted from unstructured threat intelligence reports using Named Entity Recognition☆116May 27, 2023Updated 2 years ago