[NeurIPS'24, Spotlight] CTIBench: A Benchmark for Evaluating LLMs in Cyber Threat Intelligence
☆83Feb 11, 2026Updated 2 months ago
Alternatives and similar repositories for cti-bench
Users that are interested in cti-bench are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- AnnoCTR corpus for detection and linking of entities in cyber threat reports☆28Apr 12, 2024Updated 2 years ago
- CyberMetric dataset☆121Jan 1, 2025Updated last year
- A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports☆32Aug 21, 2023Updated 2 years ago
- ☆10Jan 21, 2019Updated 7 years ago
- RedSage: A Cybersecurity Generalist LLM (ICLR'26)☆42Apr 24, 2026Updated last week
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- CyberBench: A Multi-Task Cyber LLM Benchmark☆32Apr 29, 2025Updated last year
- ☆42Feb 18, 2026Updated 2 months ago
- MALOnt - an ontology for Malware Threat Intelligence.☆13Jul 8, 2021Updated 4 years ago
- stix-icons is a collection of colourful and clean icons for use in software, training and marketing material to visualize cyber threats a…☆38Dec 15, 2022Updated 3 years ago
- ☆36Jan 27, 2026Updated 3 months ago
- Data for CyberSOCEval, an LLM benchmark by Meta & CrowdStrike☆22Sep 22, 2025Updated 7 months ago
- A tool based on python to parse C/C++ code into code property graph☆17Nov 4, 2022Updated 3 years ago
- Collection of videos of Raids on Cybercriminals☆22Mar 19, 2025Updated last year
- Extracts IoCs, TTPs and the relationships between them. Outputs a STIX 2.1 bundle.☆80Apr 17, 2026Updated 2 weeks ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- An overview of LLMs for cybersecurity.☆1,304Apr 16, 2026Updated 2 weeks ago
- Cybersecurity demo for Neo4j's Connections: Graphs in Cybersecurity 2021☆14May 17, 2022Updated 3 years ago
- Intel Retrieval Augmented Generation (RAG) Utilities☆90Jan 29, 2024Updated 2 years ago
- Replication package for the paper "Automatic Mapping of Unstructured Cyber Threat Intelligence: An Experimental Study" published at the I…☆59Aug 29, 2022Updated 3 years ago
- SecLLMHolmes is a generalized, fully automated, and scalable framework to systematically evaluate the performance (i.e., accuracy and rea…☆65May 4, 2025Updated last year
- Code for the paper "Knowledge Base Completion for Constructing Problem-Oriented Medical Records" at MLHC 2020☆11Jun 8, 2021Updated 4 years ago
- ☆237Apr 22, 2026Updated 2 weeks ago
- ⚠️ ARCHIVED**: This repository is no longer actively maintained. All Sigma rules are now managed and available in SIEM Rules☆12Mar 19, 2026Updated last month
- Turn a supported list of filetypes (e.g. .docx) into a markdown structured text file. Also optionally defangs indicators and extract text…☆12Apr 21, 2026Updated 2 weeks ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Hundred Days of Yara Challenge☆12Jun 21, 2022Updated 3 years ago
- ☆10Jul 9, 2020Updated 5 years ago
- ☆108Jun 2, 2024Updated last year
- LLM Agent Skill for YARA rule authoring and review☆53Feb 8, 2026Updated 2 months ago
- [USENIX Security '24] An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models: Injecting Disguised Vulnerabilities agai…☆58Mar 22, 2025Updated last year
- NHS Hack Day website☆13Apr 25, 2026Updated last week
- MCP easy installer is a robust mcp server with tools to search, install, configure, repair and uninstall MCP servers☆17Apr 19, 2025Updated last year
- ORION is a tool that ingests datasets from diverse knowledge bases and transforms them into modular, interoperable knowledge graphs.☆17Apr 29, 2026Updated last week
- Evolving fuzzers with large language models☆17Dec 14, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Cyber attack attribution is the process of attempting to trace back a piece of code or malware to a perpetrator of a cyberattack. As cybe…☆15Jan 15, 2021Updated 5 years ago
- QA system based on Medical knowledge graph☆15Jun 26, 2019Updated 6 years ago
- The D-CIPHER and NYU CTF baseline LLM Agents built for NYU CTF Bench☆142Oct 25, 2025Updated 6 months ago
- 该资源为安全相关的数据集,包括恶意URL、恶意流量、图像分类、恶意软件等,希望对您有所帮助~☆10Apr 21, 2021Updated 5 years ago
- Cybersecurity Intelligent Pentesting Helper for Ethical Researcher (CIPHER). Fine tuned LLM for penetration testing guidance based on wri…☆38Dec 24, 2024Updated last year
- Automated Discovery and Mapping ATT&CK Tactics and Techniques for Unstructured Cyber Threat Intelligence☆19Jan 26, 2024Updated 2 years ago
- A python app to predict Att&ck tactics and techniques from cyber threat reports☆128Nov 15, 2023Updated 2 years ago