pretrained BERT model for cyber security text, learned CyberSecurity Knowledge
☆208Apr 28, 2023Updated 2 years ago
Alternatives and similar repositories for SecBERT
Users that are interested in SecBERT are comparing it to the libraries listed below
Sorting:
- SecureBERT is a domain-specific language model to represent cybersecurity textual data.☆110Jul 19, 2024Updated last year
- ☆21Dec 22, 2021Updated 4 years ago
- Extracting Attack Behavior from Threat Reports☆81Apr 28, 2023Updated 2 years ago
- NLP model and tech for cyber security tasks☆86Mar 22, 2023Updated 2 years ago
- ☆86Mar 29, 2023Updated 2 years ago
- Machine learning on knowledge graphs for context-aware security monitoring (data and model)☆18Mar 11, 2022Updated 3 years ago
- Cyber Security concepts extracted from unstructured threat intelligence reports using Named Entity Recognition☆116May 27, 2023Updated 2 years ago
- SMET : Semantic Mapping of CVE to ATT&CK and its Application to Cybersecurity☆52Sep 14, 2024Updated last year
- Replication package for the paper "Automatic Mapping of Unstructured Cyber Threat Intelligence: An Experimental Study" published at the I…☆57Aug 29, 2022Updated 3 years ago
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆182Mar 23, 2023Updated 2 years ago
- A Corpus of Data from Various Cybersecurity Blogs☆15Jun 28, 2022Updated 3 years ago
- Information Security Knowledge Graph about NVD CAPEC CWE CPE ..☆66May 12, 2020Updated 5 years ago
- The SEPSES Cyber-KB Engine☆27Nov 27, 2024Updated last year
- CVE\CWE\CAPEC\ATT&CK, security knowledge graph, knowledge graph completion☆14Jun 9, 2023Updated 2 years ago
- Collection of data sources that can be used to provide context to security events☆26Jun 30, 2015Updated 10 years ago
- network security named entity recognition, Chinese☆11Aug 27, 2019Updated 6 years ago
- ☆16Jan 5, 2017Updated 9 years ago
- Threat Feeds, Threat lists, and regular lists of known IP ranges and domains. It updates every 4 hours.☆16May 21, 2021Updated 4 years ago
- 🚨ATTENTION🚨 The CVE mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here as…☆240Apr 3, 2024Updated last year
- AI driven Web Application Firewall☆32Dec 12, 2022Updated 3 years ago
- CyberMetric dataset☆115Jan 1, 2025Updated last year
- This is a project source for NER in cybersecurity threat intelligence☆22Jul 4, 2022Updated 3 years ago
- A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports☆28Aug 21, 2023Updated 2 years ago
- VTC - Velociraptor Timeline Creator☆19May 15, 2024Updated last year
- Python library for video editing, presentation video generation, motion graphics, shader art coding, and other video production tasks☆17Sep 17, 2024Updated last year
- A word2vec model trained over Vulners☆16Jan 3, 2022Updated 4 years ago
- APT-KGL: An Intelligent APT Detection System Based on Threat Knowledge and Heterogeneous Provenance Graph Learning☆78Jul 8, 2022Updated 3 years ago
- Corpus of auto-labeled text for the cyber security domain☆97Nov 27, 2019Updated 6 years ago
- Falcon Integration Gateway (FIG)☆23Updated this week
- ATLAS: A Sequence-based Learning Approach for Attack Investigation☆176Sep 3, 2022Updated 3 years ago
- TRAM is an open-source platform designed to advance research into automating the mapping of cyber threat intelligence reports to MITRE AT…☆548May 6, 2025Updated 9 months ago
- Public datasets to help you address various cyber security problems.☆465Mar 28, 2022Updated 3 years ago
- Open-source Fabric templates for cybersecurity and compliance☆31Jan 13, 2025Updated last year
- Utilities for working with vivisect☆26Oct 1, 2025Updated 5 months ago
- A Test Project for a Network Security-oriented LLM Tool Emulating AutoGPT☆286Nov 15, 2023Updated 2 years ago
- Intel Retrieval Augmented Generation (RAG) Utilities☆91Jan 29, 2024Updated 2 years ago
- ☆90Jan 4, 2023Updated 3 years ago
- LLM powered agents for scanning vulnerabilities on any website - Llama 3 8B, Groq, Selenium, CrewAI, Exa AI☆29Aug 8, 2024Updated last year
- CVE2ATT&CK: BERT-based mapping of CVEs to MITRE ATT&CK Techniques☆21Aug 24, 2022Updated 3 years ago