heyad / Teaching
☆10Updated 5 months ago
Related projects: ⓘ
- Open Source Threat Intelligence Platform☆144Updated 11 months ago
- A threat sighting collects the behavior of a real threats and the observables used during its engagement.☆13Updated 2 years ago
- Merge of two major cyber adversary datasets, MITRE ATT&CK and ETDA/ThaiCERT Threat Actor Cards, enabling victim/motivation-adversary-tech…☆50Updated 2 years ago
- A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports☆18Updated last year
- pretrained BERT model for cyber security text, learned CyberSecurity Knowledge☆150Updated last year
- Machine learning on knowledge graphs for context-aware security monitoring (data and model)☆15Updated 2 years ago
- Interface LLMs from within MISP to extract TTPs and threat intel from CTI reports☆17Updated 10 months ago
- ☆158Updated last month
- "Linking Threat Tactics, Techniques, and Patterns with Defensive Weaknesses, Vulnerabilities and Affected Platform Configurations for Cyb…☆84Updated 2 months ago
- A web application for generating, parsing and validating, manipulating, and visualizing CACAO v2.0 playbooks.☆21Updated 6 months ago
- Suricata JSON schema project☆12Updated 4 years ago
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆68Updated 9 months ago
- Intelligence around common attacker behaviors (MITRE ATT&CK TTPs), in the form of ATT&CK Navigator "layer" json files.☆34Updated 2 years ago
- STIX 2.1 Visualizer, Attack and Activity Thread Graph for Threat Modeling☆31Updated last year
- ☆95Updated 3 months ago
- Intel Retrieval Augmented Generation (RAG) Utilities☆86Updated 7 months ago
- Save toil in security operations with: Detection & Intelligence Analysis for New Alerts (D.I.A.N.A. )☆107Updated 2 weeks ago
- ☆17Updated 5 months ago
- OASIS TC Open Repository: Lightweight visualization for STIX 2.0 objects and relationships☆135Updated 6 months ago
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆189Updated 10 months ago
- A word2vec model trained over Vulners☆14Updated 2 years ago
- TRAM is an open-source platform designed to advance research into automating the mapping of cyber threat intelligence reports to MITRE AT…☆431Updated 3 months ago
- SMET : Semantic Mapping of CVE to ATT&CK and its Application to Cybersecurity☆34Updated last week
- Public datasets to help you address various cyber security problems.☆332Updated 2 years ago
- STIX2 graph visualisation library in JS☆72Updated 3 weeks ago
- A comprehensive survey of datasets for research in host-based and/or network-based intrusion detection, with a focus on enterprise networ…☆30Updated last month
- The principal objective of this project is to develop a knowledge base of the tactics, techniques, and procedures (TTPs) used by insiders…☆135Updated 2 weeks ago
- ☆89Updated 4 years ago
- A Python library to help with some common threat hunting data analysis operations☆138Updated last year
- Taxonomies used in MISP taxonomy system and can be used by other information sharing tool.☆260Updated 2 weeks ago