CVE2ATT&CK: BERT-based mapping of CVEs to MITRE ATT&CK Techniques
☆21Aug 24, 2022Updated 3 years ago
Alternatives and similar repositories for CVE2ATT-CK
Users that are interested in CVE2ATT-CK are comparing it to the libraries listed below
Sorting:
- SMET : Semantic Mapping of CVE to ATT&CK and its Application to Cybersecurity☆52Sep 14, 2024Updated last year
- ☆44Apr 29, 2020Updated 5 years ago
- A word2vec model trained over Vulners☆16Jan 3, 2022Updated 4 years ago
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆182Mar 23, 2023Updated 2 years ago
- ☆89Jan 4, 2023Updated 3 years ago
- A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports☆29Aug 21, 2023Updated 2 years ago
- Replication package for the paper "Automatic Mapping of Unstructured Cyber Threat Intelligence: An Experimental Study" published at the I…☆58Aug 29, 2022Updated 3 years ago
- ☆21Dec 22, 2021Updated 4 years ago
- Brain Tumor Detection with TransferLearning (VGG16, MobileNet, ResNet50, InceptionV3)☆12Jul 1, 2023Updated 2 years ago
- 🚨ATTENTION🚨 The CVE mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here as…☆240Apr 3, 2024Updated last year
- State of vulnerabilties report☆11Feb 20, 2020Updated 6 years ago
- "Linking Threat Tactics, Techniques, and Patterns with Defensive Weaknesses, Vulnerabilities and Affected Platform Configurations for Cyb…☆106Nov 9, 2025Updated 4 months ago
- This GitHub Action creates a GitHub contribution calendar on a 3D profile image.☆12Nov 10, 2024Updated last year
- ☆12Mar 23, 2024Updated last year
- ☆12Nov 19, 2025Updated 4 months ago
- ⚠️ ARCHIVED**: This repository is no longer actively maintained. All Sigma rules are now managed and available in SIEM Rules☆12Updated this week
- A network discrete event simulator for peer-to-peer network modeling.☆13Sep 1, 2019Updated 6 years ago
- Firebase C++ SDK☆12Aug 15, 2024Updated last year
- Turn a supported list of filetypes (e.g. .docx) into a markdown structured text file. Also optionally defangs indicators and extract text…☆12Mar 4, 2026Updated 2 weeks ago
- This repository holds the data, source code and resulting model weights for the paper "Towards end-to-end Cyberthreat Detection from Twit…☆17Sep 14, 2021Updated 4 years ago
- Automating Cyber Threat Intelligence Reporting with Natural Language Generation☆15Jan 24, 2024Updated 2 years ago
- NHS Hack Day website☆13Jan 28, 2026Updated last month
- The MITRE ATT&CK Mapping Datasets☆19Jan 23, 2024Updated 2 years ago
- Python code to automatically produce a summary of a piece of text.☆12Sep 8, 2016Updated 9 years ago
- MulVAL interaction rules and their mapping to MITRE ATT&CK Techniques☆13Oct 21, 2024Updated last year
- Signal SNR, periodicity, despike, and time registration accommodating N time series☆12Jun 21, 2017Updated 8 years ago
- Code from the paper: Neurlux: Dynamic Malware Analysis Without Feature Engineering☆13Dec 27, 2020Updated 5 years ago
- ☆16Jun 21, 2021Updated 4 years ago
- Example application for the task of fine-tuning pretrained machine translation models on highly domain-specific, self-extracted translate…☆17May 4, 2025Updated 10 months ago
- ☆12Aug 15, 2023Updated 2 years ago
- Generative AI-based CyberSecurity-focused Prompt Dataset for Benchmarking Large Language Models☆35Jan 14, 2025Updated last year
- A Google App Engine application to archive the posts from Hacker News☆16Jun 3, 2018Updated 7 years ago
- ☆17Oct 19, 2023Updated 2 years ago
- SECURE: Benchmarking Generative Large Language Models as a Cyber Advisory☆17Aug 28, 2024Updated last year
- A comprehensive and accurate emulation of Bitcoin network implementation☆14Nov 1, 2022Updated 3 years ago
- ☆31Oct 15, 2025Updated 5 months ago
- Automated Discovery and Mapping ATT&CK Tactics and Techniques for Unstructured Cyber Threat Intelligence☆19Jan 26, 2024Updated 2 years ago
- A labeled dataset used for the knowledge graph construction.☆34Nov 30, 2023Updated 2 years ago
- ☆19Dec 3, 2012Updated 13 years ago