☆20Mar 31, 2019Updated 7 years ago
Alternatives and similar repositories for AttackAttributionDataset
Users that are interested in AttackAttributionDataset are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆25Dec 10, 2022Updated 3 years ago
- Archive of publicly available threat INTel reports (mostly APT Reports but not limited to).☆11Sep 30, 2018Updated 7 years ago
- A labeled dataset used for the knowledge graph construction.☆34Nov 30, 2023Updated 2 years ago
- The AutoPath pipeline for similarity modeling on heterogeneous networks with automatic path discovery☆11Sep 12, 2019Updated 6 years ago
- Unified Cybersecurity Ontology☆110May 6, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Semantic Proximity Search on Heterogeneous Graph by Proximity Embedding☆15Feb 20, 2018Updated 8 years ago
- Graphics, icons, and diagrams to support STIX 2☆48Jun 2, 2021Updated 4 years ago
- GoTEE - example application☆17Apr 10, 2026Updated 3 weeks ago
- DGA detection project that aims to rapidly build and deploy a machine learning system to detect domain names generated by malware.☆18Jan 29, 2019Updated 7 years ago
- 黑客画像构建以及威胁事件的预测,通过搜集各大黑客技术论坛的聊天记录,绘制任务的拓扑图,以及技能雷达图。同时进一步预测监控攻击事件的发生以及溯源☆21Mar 1, 2019Updated 7 years ago
- python DUML library for DJI drones☆12May 11, 2020Updated 5 years ago
- ☆10Jan 21, 2019Updated 7 years ago
- Static Php Analysis and Fuzzer☆26Apr 22, 2014Updated 12 years ago
- Implementation of the DeepLog anomaly detection system☆19Jul 28, 2018Updated 7 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Data for CyberSOCEval, an LLM benchmark by Meta & CrowdStrike☆22Sep 22, 2025Updated 7 months ago
- The repository implement the LMTracker model based on paper: LMTracker: Lateral movement path detection based on heterogeneous graph embe…☆17Jul 12, 2023Updated 2 years ago
- Bug Bounty Monitor☆15Nov 23, 2020Updated 5 years ago
- RENet is a deep learning tensorflow2.0 model for classify ATT&CK techniques and tactics for cyber threat intelligence with relevance enha…☆12Jan 11, 2023Updated 3 years ago
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆181Mar 23, 2023Updated 3 years ago
- This is a project source for NER in cybersecurity threat intelligence☆22Jul 4, 2022Updated 3 years ago
- ☆21Aug 10, 2024Updated last year
- ACT documentation repo☆17May 22, 2024Updated last year
- Cyber-investigation Analysis Standard Expression (CASE) Ontology☆72Sep 23, 2025Updated 7 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Fully functional & encrypted chat-application.☆11Mar 28, 2024Updated 2 years ago
- ☆24Sep 28, 2022Updated 3 years ago
- 北航2013年计算机夏令营机试题,2 problems written in C language,2013☆10Jul 21, 2015Updated 10 years ago
- A framework for synthesizing lateral movement login data.☆29May 20, 2021Updated 4 years ago
- OASIS-TAC-TC: OWL representation of the TAC TCs work products are maintained here. - https://github.com/oasis-tcs/tac-ontology☆17Oct 27, 2021Updated 4 years ago
- Deep neural networks and convolutional neural networks to classify German traffic signs.☆16Nov 28, 2018Updated 7 years ago
- 寻找可注入进程☆13Jul 16, 2020Updated 5 years ago
- PyTorch implementation of Stereopagnosia: Fooling Stereo Networks with Adversarial Perturbations (in AAAI 2021)☆13Mar 20, 2022Updated 4 years ago
- ☆14Mar 19, 2020Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Experimental python3.x based ICMP bind shell listener using scapy and windows 'compatible'☆10May 29, 2020Updated 5 years ago
- provides a new dataset for NER missions in cyber threat intelligence (CTI) field.☆42Aug 3, 2022Updated 3 years ago
- Python3 implementation of the paper [Large-scale optimal transport map estimation using projection pursuit]☆15Feb 24, 2021Updated 5 years ago
- A Modern Approach☆10Sep 5, 2015Updated 10 years ago
- Collection of exploits that were verified by an automated system☆13Jun 17, 2021Updated 4 years ago
- 聚合交易平台BitLeague☆11Sep 30, 2018Updated 7 years ago
- A template to make injected DLLs for modding☆11Dec 17, 2020Updated 5 years ago