☆21Dec 22, 2021Updated 4 years ago
Alternatives and similar repositories for CyBERT
Users that are interested in CyBERT are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- pretrained BERT model for cyber security text, learned CyberSecurity Knowledge☆209Apr 28, 2023Updated 3 years ago
- A cybersecurity dataset consisting of 4.3 million entries of Twitter, Blogs, Paper, and CVEs☆20May 26, 2023Updated 2 years ago
- SACTI - Securely aggregate CTI sightings and report them on MISP☆14Oct 24, 2022Updated 3 years ago
- A word2vec model trained over Vulners☆16Jan 3, 2022Updated 4 years ago
- A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports☆32Aug 21, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A repository for a Deep Q-Learning approach to intrusion detection for networks cyber-attacks.☆10Sep 3, 2021Updated 4 years ago
- Open-source Fabric templates for cybersecurity and compliance☆32Jan 13, 2025Updated last year
- CVE2ATT&CK: BERT-based mapping of CVEs to MITRE ATT&CK Techniques☆21Aug 24, 2022Updated 3 years ago
- Augmentation to Machine Readable CTI☆38Apr 22, 2026Updated 2 weeks ago
- TTPDrill focuses on developing automated and context-aware analytics of cyber threat intelligence to accurately learn attack patterns (TT…☆28May 29, 2020Updated 5 years ago
- Single sign-on using SSH key pairs and fine-grained remote command authorization☆16Mar 15, 2024Updated 2 years ago
- The application describes how data can be stored, structured and read out on a local OPC UA server built with Node-Red. The data used are…☆13Oct 13, 2023Updated 2 years ago
- The main goal of this research is to derive the challenges in intrusion based cyber security systems and providing the solutions using cu…☆14May 16, 2021Updated 4 years ago
- This is a project source for NER in cybersecurity threat intelligence☆22Jul 4, 2022Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Code from the paper: Neurlux: Dynamic Malware Analysis Without Feature Engineering☆13Dec 27, 2020Updated 5 years ago
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆37Oct 21, 2025Updated 6 months ago
- An LLM for CTI reports - to be presented at FIRST Fukuoka 2024☆23Jan 26, 2026Updated 3 months ago
- ☆12Aug 15, 2023Updated 2 years ago
- The repository consists of : Construction of the corpus, Named Entity Recognition , Relationship Extraction , Construction of knowledge g…☆37Dec 5, 2022Updated 3 years ago
- General OSINT tooling and websites☆31Apr 9, 2026Updated 3 weeks ago
- We use attention model for intrusion detection. The idea of Hierarchical Attention Model for Intrusion Detection comes from the applicat…☆12Jul 4, 2020Updated 5 years ago
- ☆37Oct 15, 2025Updated 6 months ago
- Cyber Security concepts extracted from unstructured threat intelligence reports using Named Entity Recognition☆118May 27, 2023Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- An annotation tool for rapid multi-task collaborative information extraction for knowledge graph construction.☆21Jun 12, 2025Updated 10 months ago
- ☆87Mar 29, 2023Updated 3 years ago
- Code of "Instruction Multi-Constraint Molecular Generation Using a Teacher-Student Large Language Model"☆14Jul 8, 2025Updated 9 months ago
- A client for distributed financial news webscraping.☆14Mar 1, 2021Updated 5 years ago
- ☆89Jan 4, 2023Updated 3 years ago
- ☆27Jun 25, 2021Updated 4 years ago
- CLI enabling more autonomous black-box penetration tests using Large Language Models (LLMs)☆51Apr 30, 2026Updated last week
- Self sustainable DOM content fuzzy hashing☆11Oct 5, 2024Updated last year
- On-Premises Open Cyber Threat Intelligence Platform☆11Oct 29, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- [COLING 2022]: CommunityLM: Probing Partisan Worldviews from Language Models☆15Jan 31, 2023Updated 3 years ago
- The TextWorld KG Dataset from the paper Building Dynamic Knowledge Graphs from Text-based Games☆10Mar 11, 2020Updated 6 years ago
- Capsule Routing for Named Entity Recognition☆10Dec 22, 2020Updated 5 years ago
- With the rapid adoption of smartphones, tablets, and mobile apps, they are increasingly becoming part of children’s daily life for amusem…☆12Apr 7, 2017Updated 9 years ago
- ☆13Jun 20, 2024Updated last year
- ☆14Jun 17, 2024Updated last year
- Automating Cyber Threat Intelligence Reporting with Natural Language Generation☆15Jan 24, 2024Updated 2 years ago