gfek / Real-CyberSecurity-DatasetsLinks
Public datasets to help you address various cyber security problems.
☆450Updated 3 years ago
Alternatives and similar repositories for Real-CyberSecurity-Datasets
Users that are interested in Real-CyberSecurity-Datasets are comparing it to the libraries listed below
Sorting:
- A curated list of amazingly awesome Cybersecurity datasets☆1,799Updated last year
- Awesome list of AI for cybersecurity including network (network traffic analysis and intrusion detection), endpoint (anti-malware), appli…☆233Updated 2 years ago
- pretrained BERT model for cyber security text, learned CyberSecurity Knowledge☆192Updated 2 years ago
- Machine Learning for Cybersecurity Cookbook, published by Packt☆347Updated 2 years ago
- TRAM is an open-source platform designed to advance research into automating the mapping of cyber threat intelligence reports to MITRE AT…☆518Updated 5 months ago
- This is a five-step framework for the development of intrusion detection systems (IDS) using machine learning (ML) considering model real…☆55Updated 3 years ago
- A curated list of large language model tools for cybersecurity research.☆477Updated last year
- Anomaly detection in network traffic and event logs using deep learning (w/ Pytorch)☆71Updated 6 years ago
- Hands-On Artificial Intelligence for Cybersecurity, publised by Packt☆171Updated 2 years ago
- SecureBERT is a domain-specific language model to represent cybersecurity textual data.☆99Updated last year
- STIX data representing MITRE ATT&CK☆464Updated 2 months ago
- "Linking Threat Tactics, Techniques, and Patterns with Defensive Weaknesses, Vulnerabilities and Affected Platform Configurations for Cyb…☆97Updated last year
- A python module for working with ATT&CK☆601Updated this week
- Machine Learning For Cybersecurity.☆66Updated 5 years ago
- A comprehensive survey of datasets for research in host-based and/or network-based intrusion detection, with a focus on enterprise networ…☆46Updated last week
- IDS monitors a network or systems for malicious activity and protects a computer network from unauthorized access from users,including pe…☆103Updated 3 years ago
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆167Updated 2 years ago
- A machine learning based Intrusion Detection System☆150Updated 5 years ago
- A curated list of resources dedicated to reinforcement learning applied to cyber security.☆939Updated 3 weeks ago
- A logic-based enterprise network security analyzer☆129Updated 2 years ago
- Hands-On Machine Learning for Cybersecurity, published by Packt☆193Updated 2 years ago
- A collection of agents that use Large Language Models (LLMs) to perform tasks common on our day to day jobs in cyber security.☆178Updated last year
- Machine Learning for Network Intrusion Detection & Misc Cyber Security Utilities☆210Updated last year
- ☆122Updated 5 years ago
- The objective of this program is to leverage AI-LLM technology to process of human language-based CTI documents to succinctly summarize t…☆64Updated 4 months ago
- Official ID2T repository. ID2T creates labeled IT network datasets that contain user defined synthetic attacks.☆64Updated 2 years ago
- 🚨ATTENTION🚨 The CVE mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here as…☆241Updated last year
- Use machine learning to classify malware. Malware analysis 101. Set up a cybersecurity lab environment. Learn how to tackle data class im…☆17Updated 5 years ago
- Scripts to deploy virtual testbed for log data analysis and anomaly detection.☆26Updated last year
- Anomaly based Malware Detection using Machine Learning (PE and URL)☆166Updated 8 months ago