CVE2ATT&CK: BERT-based mapping of CVEs to MITRE ATT&CK Techniques
☆21Aug 24, 2022Updated 3 years ago
Alternatives and similar repositories for CVE2ATT-CK
Users that are interested in CVE2ATT-CK are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- SMET : Semantic Mapping of CVE to ATT&CK and its Application to Cybersecurity☆54Sep 14, 2024Updated last year
- ☆44Apr 29, 2020Updated 6 years ago
- A word2vec model trained over Vulners☆16Jan 3, 2022Updated 4 years ago
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆181Mar 23, 2023Updated 3 years ago
- ☆89Jan 4, 2023Updated 3 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports☆32Aug 21, 2023Updated 2 years ago
- ☆21Dec 22, 2021Updated 4 years ago
- 🚨ATTENTION🚨 The CVE mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here as…☆245Apr 3, 2024Updated 2 years ago
- "Linking Threat Tactics, Techniques, and Patterns with Defensive Weaknesses, Vulnerabilities and Affected Platform Configurations for Cyb…☆106Nov 9, 2025Updated 5 months ago
- State of vulnerabilties report☆11Feb 20, 2020Updated 6 years ago
- This GitHub Action creates a GitHub contribution calendar on a 3D profile image.☆12Nov 10, 2024Updated last year
- ☆11Mar 24, 2025Updated last year
- ☆12Mar 23, 2024Updated 2 years ago
- ☆12Nov 19, 2025Updated 5 months ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- ⚠️ ARCHIVED**: This repository is no longer actively maintained. All Sigma rules are now managed and available in SIEM Rules☆12Mar 19, 2026Updated last month
- Turn a supported list of filetypes (e.g. .docx) into a markdown structured text file. Also optionally defangs indicators and extract text…☆12Apr 21, 2026Updated last week
- This repository holds the data, source code and resulting model weights for the paper "Towards end-to-end Cyberthreat Detection from Twit…☆17Sep 14, 2021Updated 4 years ago
- Automating Cyber Threat Intelligence Reporting with Natural Language Generation☆15Jan 24, 2024Updated 2 years ago
- NHS Hack Day website☆13Updated this week
- Python code to automatically produce a summary of a piece of text.☆12Sep 8, 2016Updated 9 years ago
- MulVAL interaction rules and their mapping to MITRE ATT&CK Techniques☆13Oct 21, 2024Updated last year
- Signal SNR, periodicity, despike, and time registration accommodating N time series☆12Jun 21, 2017Updated 8 years ago
- Code from the paper: Neurlux: Dynamic Malware Analysis Without Feature Engineering☆13Dec 27, 2020Updated 5 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Graph database version of the CVE database☆26Dec 8, 2022Updated 3 years ago
- The MITRE ATT&CK Mapping Datasets☆20Jan 23, 2024Updated 2 years ago
- WebNLG+ Challenge 2020: the automatic evaluation script for the text-to-RDF task☆16Jul 6, 2022Updated 3 years ago
- Solutions to assignments in course- "Bitcoin and Cryptocurrency Technologies", offered by coursera, Princeton University☆11Jun 28, 2018Updated 7 years ago
- A simple shell script which utilizes nmap, nikto, dirb, enum4linux and other open source goodies to automate enumeration process.☆19Jan 13, 2022Updated 4 years ago
- Example application for the task of fine-tuning pretrained machine translation models on highly domain-specific, self-extracted translate…☆17May 4, 2025Updated 11 months ago
- Generative AI-based CyberSecurity-focused Prompt Dataset for Benchmarking Large Language Models☆38Jan 14, 2025Updated last year
- ☆17Oct 19, 2023Updated 2 years ago
- SECURE: Benchmarking Generative Large Language Models as a Cyber Advisory☆17Aug 28, 2024Updated last year
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- A comprehensive and accurate emulation of Bitcoin network implementation☆14Nov 1, 2022Updated 3 years ago
- ☆36Oct 15, 2025Updated 6 months ago
- Automated Discovery and Mapping ATT&CK Tactics and Techniques for Unstructured Cyber Threat Intelligence☆19Jan 26, 2024Updated 2 years ago
- Data related to the SANS Internet Storm Center☆13Sep 12, 2025Updated 7 months ago
- A labeled dataset used for the knowledge graph construction.☆34Nov 30, 2023Updated 2 years ago
- Code of "Instruction Multi-Constraint Molecular Generation Using a Teacher-Student Large Language Model"☆14Jul 8, 2025Updated 9 months ago
- ☆25Dec 10, 2022Updated 3 years ago