pretrained BERT model for cyber security text, learned CyberSecurity Knowledge
☆209Apr 28, 2023Updated 3 years ago
Alternatives and similar repositories for SecBERT
Users that are interested in SecBERT are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- SecureBERT is a domain-specific language model to represent cybersecurity textual data.☆114Jul 19, 2024Updated last year
- Extracting Attack Behavior from Threat Reports☆80Apr 28, 2023Updated 3 years ago
- NLP model and tech for cyber security tasks☆86Mar 22, 2023Updated 3 years ago
- Machine learning on knowledge graphs for context-aware security monitoring (data and model)☆18Mar 11, 2022Updated 4 years ago
- ☆87Mar 29, 2023Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- An implementation of BERT for cybersecurity named entity recognition☆26Nov 13, 2020Updated 5 years ago
- Information Security Knowledge Graph about NVD CAPEC CWE CPE ..☆67May 12, 2020Updated 6 years ago
- An extended version of SecureBERT, trained on top of both base and large version of RoBERTa using 10 GB cybersecurity-related data☆33Jan 26, 2024Updated 2 years ago
- The SEPSES Cyber-KB Engine☆28Nov 27, 2024Updated last year
- CVE\CWE\CAPEC\ATT&CK, security knowledge graph, knowledge graph completion☆14Jun 9, 2023Updated 2 years ago
- A Corpus of Data from Various Cybersecurity Blogs☆15Jun 28, 2022Updated 3 years ago
- Replication package for the paper "Automatic Mapping of Unstructured Cyber Threat Intelligence: An Experimental Study" published at the I…☆60Aug 29, 2022Updated 3 years ago
- Cyber Security concepts extracted from unstructured threat intelligence reports using Named Entity Recognition☆118May 27, 2023Updated 2 years ago
- Collection of data sources that can be used to provide context to security events☆26Jun 30, 2015Updated 10 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- SMET : Semantic Mapping of CVE to ATT&CK and its Application to Cybersecurity☆53Sep 14, 2024Updated last year
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆181Mar 23, 2023Updated 3 years ago
- network security named entity recognition, Chinese☆11Aug 27, 2019Updated 6 years ago
- ☆12Jan 16, 2023Updated 3 years ago
- A word2vec model trained over Vulners☆16Jan 3, 2022Updated 4 years ago
- APT-KGL: An Intelligent APT Detection System Based on Threat Knowledge and Heterogeneous Provenance Graph Learning☆78Jul 8, 2022Updated 3 years ago
- Threat Feeds, Threat lists, and regular lists of known IP ranges and domains. It updates every 4 hours.☆16May 21, 2021Updated 5 years ago
- ☆89Jan 4, 2023Updated 3 years ago
- TRAM is an open-source platform designed to advance research into automating the mapping of cyber threat intelligence reports to MITRE AT…☆564May 6, 2025Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- CVE2ATT&CK: BERT-based mapping of CVEs to MITRE ATT&CK Techniques☆21Aug 24, 2022Updated 3 years ago
- This repo contains the data and codes for the paper submitted to ACM TKDD, titled "A Compact Vulnerability Knowledge Graph for Risk Asses…☆19Mar 8, 2023Updated 3 years ago
- A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports☆32Aug 21, 2023Updated 2 years ago
- ☆16Jan 5, 2017Updated 9 years ago
- A cybersecurity dataset consisting of 4.3 million entries of Twitter, Blogs, Paper, and CVEs☆20May 26, 2023Updated 2 years ago
- "Linking Threat Tactics, Techniques, and Patterns with Defensive Weaknesses, Vulnerabilities and Affected Platform Configurations for Cyb…☆108Nov 9, 2025Updated 6 months ago
- [NAACL 2025] LLM-Supported Natural Language to Bash Translation☆16Apr 28, 2026Updated 3 weeks ago
- Threat hunting in social media☆12Feb 17, 2019Updated 7 years ago
- ☆16Dec 21, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Legacy Sigma Tools (sigmac etc.)☆16May 7, 2023Updated 3 years ago
- Cyber Threat Intelligence Repository expressed in STIX 2.0☆2,061May 12, 2026Updated last week
- CyberAttack Sensing and Information Extraction☆74Dec 26, 2024Updated last year
- Private Search Set (PSS) is an extension to standard Bloom filter or a standalone hash file to describe and share private set.☆16Jan 10, 2025Updated last year
- ATLAS: A Sequence-based Learning Approach for Attack Investigation☆178Sep 3, 2022Updated 3 years ago
- ☆12Feb 18, 2021Updated 5 years ago
- Named entity and triple Dataset to create knowledge graphs for Cybersecurity education☆32Aug 4, 2023Updated 2 years ago