☆80Feb 11, 2026Updated last month
Alternatives and similar repositories for cti-bench
Users that are interested in cti-bench are comparing it to the libraries listed below
Sorting:
- AnnoCTR corpus for detection and linking of entities in cyber threat reports☆27Apr 12, 2024Updated last year
- CyberMetric dataset☆116Jan 1, 2025Updated last year
- A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports☆29Aug 21, 2023Updated 2 years ago
- ☆10Jan 21, 2019Updated 7 years ago
- Prevent cloud misconfigurations during build-time for Terraform, Cloudformation, Kubernetes, Serverless framework, and other infrastructu…☆11Jan 13, 2026Updated 2 months ago
- CyberBench: A Multi-Task Cyber LLM Benchmark☆30Apr 29, 2025Updated 10 months ago
- ☆41Feb 18, 2026Updated last month
- MALOnt - an ontology for Malware Threat Intelligence.☆13Jul 8, 2021Updated 4 years ago
- Additional material for the malware variants identification paper☆10Sep 6, 2019Updated 6 years ago
- SECURE: Benchmarking Generative Large Language Models as a Cyber Advisory☆17Aug 28, 2024Updated last year
- OWASP Ontology-driven Threat Modelling framework☆40Jul 11, 2023Updated 2 years ago
- stix-icons is a collection of colourful and clean icons for use in software, training and marketing material to visualize cyber threats a…☆38Dec 15, 2022Updated 3 years ago
- ☆36Jan 27, 2026Updated last month
- Data for CyberSOCEval, an LLM benchmark by Meta & CrowdStrike☆21Sep 22, 2025Updated 5 months ago
- TTPDrill focuses on developing automated and context-aware analytics of cyber threat intelligence to accurately learn attack patterns (TT…☆28May 29, 2020Updated 5 years ago
- Collector for metrics, logs, traces☆19Updated this week
- A place to share my lnav .json formats. For more information on the incredible Log Navigator, visit http://lnav.org☆25Jun 18, 2023Updated 2 years ago
- A tool based on python to parse C/C++ code into code property graph☆17Nov 4, 2022Updated 3 years ago
- An overview of LLMs for cybersecurity.☆1,259Mar 13, 2026Updated last week
- Intel Retrieval Augmented Generation (RAG) Utilities☆91Jan 29, 2024Updated 2 years ago
- Replication package for the paper "Automatic Mapping of Unstructured Cyber Threat Intelligence: An Experimental Study" published at the I…☆58Aug 29, 2022Updated 3 years ago
- SecLLMHolmes is a generalized, fully automated, and scalable framework to systematically evaluate the performance (i.e., accuracy and rea…☆64May 4, 2025Updated 10 months ago
- Code for the paper "Knowledge Base Completion for Constructing Problem-Oriented Medical Records" at MLHC 2020☆11Jun 8, 2021Updated 4 years ago
- Detection of malicious prompts used to exploit large language models (LLMs) by leveraging supervised machine learning classifiers.☆20Oct 30, 2024Updated last year
- ☆12Feb 27, 2025Updated last year
- Research Artifact for HPCA'24 Paper: *Modeling, Derivation, and Automated Analysis of Branch Predictor Security Vulnerabilities*.☆11Oct 30, 2025Updated 4 months ago
- Master UI for ROBOKOP☆15Mar 31, 2023Updated 2 years ago
- Turn a supported list of filetypes (e.g. .docx) into a markdown structured text file. Also optionally defangs indicators and extract text…☆12Mar 4, 2026Updated 2 weeks ago
- A fun POC that is built to understand AI security agents.☆34Oct 30, 2025Updated 4 months ago
- ☆108Jun 2, 2024Updated last year
- MITRE ATT&CK visualizations☆12Jan 28, 2022Updated 4 years ago
- [USENIX Security '24] An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models: Injecting Disguised Vulnerabilities agai…☆57Mar 22, 2025Updated 11 months ago
- NHS Hack Day website☆13Jan 28, 2026Updated last month
- Get all cve corresponding to a specific keyword or a list of keywords from the mitre database (https://cve.mitre.org/)☆17Aug 20, 2022Updated 3 years ago
- ORION is a tool that ingests datasets from diverse knowledge bases and transforms them into modular, interoperable knowledge graphs.☆17Mar 13, 2026Updated last week
- Evolving fuzzers with large language models☆17Dec 14, 2023Updated 2 years ago
- Cyber attack attribution is the process of attempting to trace back a piece of code or malware to a perpetrator of a cyberattack. As cybe…☆15Jan 15, 2021Updated 5 years ago
- A compiler for the Meta Attack Language☆15Apr 11, 2022Updated 3 years ago
- The D-CIPHER and NYU CTF baseline LLM Agents built for NYU CTF Bench☆137Oct 25, 2025Updated 4 months ago