CTIBench: A Benchmark for Evaluating LLMs in Cyber Threat Intelligence, NeurIPS 2024, Spotlight.
☆80Feb 11, 2026Updated last month
Alternatives and similar repositories for cti-bench
Users that are interested in cti-bench are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- AnnoCTR corpus for detection and linking of entities in cyber threat reports☆28Apr 12, 2024Updated last year
- CyberMetric dataset☆116Jan 1, 2025Updated last year
- A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports☆29Aug 21, 2023Updated 2 years ago
- ☆10Jan 21, 2019Updated 7 years ago
- Prevent cloud misconfigurations during build-time for Terraform, Cloudformation, Kubernetes, Serverless framework, and other infrastructu…☆11Jan 13, 2026Updated 2 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- CyberBench: A Multi-Task Cyber LLM Benchmark☆30Apr 29, 2025Updated 10 months ago
- ☆42Feb 18, 2026Updated last month
- MALOnt - an ontology for Malware Threat Intelligence.☆13Jul 8, 2021Updated 4 years ago
- SECURE: Benchmarking Generative Large Language Models as a Cyber Advisory☆17Aug 28, 2024Updated last year
- OWASP Ontology-driven Threat Modelling framework☆40Jul 11, 2023Updated 2 years ago
- stix-icons is a collection of colourful and clean icons for use in software, training and marketing material to visualize cyber threats a…☆38Dec 15, 2022Updated 3 years ago
- ☆36Jan 27, 2026Updated 2 months ago
- Data for CyberSOCEval, an LLM benchmark by Meta & CrowdStrike☆21Sep 22, 2025Updated 6 months ago
- TTPDrill focuses on developing automated and context-aware analytics of cyber threat intelligence to accurately learn attack patterns (TT…☆28May 29, 2020Updated 5 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Collector for metrics, logs, traces☆20Updated this week
- A tool based on python to parse C/C++ code into code property graph☆17Nov 4, 2022Updated 3 years ago
- An overview of LLMs for cybersecurity.☆1,271Mar 18, 2026Updated last week
- Intel Retrieval Augmented Generation (RAG) Utilities☆91Jan 29, 2024Updated 2 years ago
- Replication package for the paper "Automatic Mapping of Unstructured Cyber Threat Intelligence: An Experimental Study" published at the I…☆57Aug 29, 2022Updated 3 years ago
- SecLLMHolmes is a generalized, fully automated, and scalable framework to systematically evaluate the performance (i.e., accuracy and rea…☆64May 4, 2025Updated 10 months ago
- ☆12Nov 1, 2024Updated last year
- Code for the paper "Knowledge Base Completion for Constructing Problem-Oriented Medical Records" at MLHC 2020☆11Jun 8, 2021Updated 4 years ago
- Detection of malicious prompts used to exploit large language models (LLMs) by leveraging supervised machine learning classifiers.☆20Oct 30, 2024Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆12Feb 27, 2025Updated last year
- CS-Eval is a comprehensive evaluation suite for fundamental cybersecurity models or large language models' cybersecurity ability.☆60Nov 27, 2024Updated last year
- Master UI for ROBOKOP☆15Mar 31, 2023Updated 2 years ago
- Turn a supported list of filetypes (e.g. .docx) into a markdown structured text file. Also optionally defangs indicators and extract text…☆12Mar 17, 2026Updated last week
- A fun POC that is built to understand AI security agents.☆34Oct 30, 2025Updated 4 months ago
- ☆10Jul 9, 2020Updated 5 years ago
- ☆108Jun 2, 2024Updated last year
- [NAACL 2025] ETHIC: Evaluating Large Language Models on Long-Context Tasks with High Information Coverage☆16Sep 2, 2025Updated 6 months ago
- [USENIX Security '24] An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models: Injecting Disguised Vulnerabilities agai…☆57Mar 22, 2025Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- NHS Hack Day website☆13Jan 28, 2026Updated last month
- Get all cve corresponding to a specific keyword or a list of keywords from the mitre database (https://cve.mitre.org/)☆17Aug 20, 2022Updated 3 years ago
- ☆11May 3, 2019Updated 6 years ago
- Benchmarking suite for the Web-Scale Data Management course using Locust☆14Aug 9, 2024Updated last year
- Evolving fuzzers with large language models☆17Dec 14, 2023Updated 2 years ago
- Cyber attack attribution is the process of attempting to trace back a piece of code or malware to a perpetrator of a cyberattack. As cybe…☆15Jan 15, 2021Updated 5 years ago
- A compiler for the Meta Attack Language☆15Apr 11, 2022Updated 3 years ago