CVE2ATT&CK: BERT-based mapping of CVEs to MITRE ATT&CK Techniques
☆21Aug 24, 2022Updated 3 years ago
Alternatives and similar repositories for CVE2ATT-CK
Users that are interested in CVE2ATT-CK are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆44Apr 29, 2020Updated 6 years ago
- A word2vec model trained over Vulners☆16Jan 3, 2022Updated 4 years ago
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆181Mar 23, 2023Updated 3 years ago
- ☆89Jan 4, 2023Updated 3 years ago
- Vulnerability knowledge graph construction☆30Dec 24, 2022Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Replication package for the paper "Automatic Mapping of Unstructured Cyber Threat Intelligence: An Experimental Study" published at the I…☆60Aug 29, 2022Updated 3 years ago
- ☆21Dec 22, 2021Updated 4 years ago
- Brain Tumor Detection with TransferLearning (VGG16, MobileNet, ResNet50, InceptionV3)☆12Jul 1, 2023Updated 2 years ago
- "Linking Threat Tactics, Techniques, and Patterns with Defensive Weaknesses, Vulnerabilities and Affected Platform Configurations for Cyb…☆108Nov 9, 2025Updated 6 months ago
- State of vulnerabilties report☆11Feb 20, 2020Updated 6 years ago
- ☆11Mar 24, 2025Updated last year
- ☆12Nov 19, 2025Updated 6 months ago
- ⚠️ ARCHIVED**: This repository is no longer actively maintained. All Sigma rules are now managed and available in SIEM Rules☆13Mar 19, 2026Updated 2 months ago
- A network discrete event simulator for peer-to-peer network modeling.☆13Sep 1, 2019Updated 6 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Firebase C++ SDK☆12Aug 15, 2024Updated last year
- Turn a supported list of filetypes (e.g. .docx) into a markdown structured text file. Also optionally defangs indicators and extract text…☆12Apr 21, 2026Updated 3 weeks ago
- This repository holds the data, source code and resulting model weights for the paper "Towards end-to-end Cyberthreat Detection from Twit…☆17Sep 14, 2021Updated 4 years ago
- Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogue…☆95Mar 2, 2026Updated 2 months ago
- Automating Cyber Threat Intelligence Reporting with Natural Language Generation☆15Jan 24, 2024Updated 2 years ago
- NHS Hack Day website☆13Apr 25, 2026Updated 3 weeks ago
- Python code to automatically produce a summary of a piece of text.☆12Sep 8, 2016Updated 9 years ago
- MulVAL interaction rules and their mapping to MITRE ATT&CK Techniques☆13Oct 21, 2024Updated last year
- Signal SNR, periodicity, despike, and time registration accommodating N time series☆12Jun 21, 2017Updated 8 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Code from the paper: Neurlux: Dynamic Malware Analysis Without Feature Engineering☆13Dec 27, 2020Updated 5 years ago
- Graph database version of the CVE database☆26Dec 8, 2022Updated 3 years ago
- The MITRE ATT&CK Mapping Datasets☆21Jan 23, 2024Updated 2 years ago
- Solutions to assignments in course- "Bitcoin and Cryptocurrency Technologies", offered by coursera, Princeton University☆11Jun 28, 2018Updated 7 years ago
- Example application for the task of fine-tuning pretrained machine translation models on highly domain-specific, self-extracted translate…☆17May 4, 2025Updated last year
- ☆12Aug 15, 2023Updated 2 years ago
- Generative AI-based CyberSecurity-focused Prompt Dataset for Benchmarking Large Language Models☆39Jan 14, 2025Updated last year
- ☆17Oct 19, 2023Updated 2 years ago
- SECURE: Benchmarking Generative Large Language Models as a Cyber Advisory☆17Aug 28, 2024Updated last year
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- A comprehensive and accurate emulation of Bitcoin network implementation☆14Nov 1, 2022Updated 3 years ago
- Automated Discovery and Mapping ATT&CK Tactics and Techniques for Unstructured Cyber Threat Intelligence☆19Jan 26, 2024Updated 2 years ago
- Data related to the SANS Internet Storm Center☆13Sep 12, 2025Updated 8 months ago
- A labeled dataset used for the knowledge graph construction.☆35Nov 30, 2023Updated 2 years ago
- Unfetter Insight performs natural language processing and analysis for text data to determine and convert to CTI Stix data automatically.☆20Sep 4, 2018Updated 7 years ago
- Code of "Instruction Multi-Constraint Molecular Generation Using a Teacher-Student Large Language Model"☆14Jul 8, 2025Updated 10 months ago
- ☆19Dec 3, 2012Updated 13 years ago