CVE2ATT&CK: BERT-based mapping of CVEs to MITRE ATT&CK Techniques
☆21Aug 24, 2022Updated 3 years ago
Alternatives and similar repositories for CVE2ATT-CK
Users that are interested in CVE2ATT-CK are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- SMET : Semantic Mapping of CVE to ATT&CK and its Application to Cybersecurity☆52Sep 14, 2024Updated last year
- ☆44Apr 29, 2020Updated 5 years ago
- A word2vec model trained over Vulners☆16Jan 3, 2022Updated 4 years ago
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆181Mar 23, 2023Updated 3 years ago
- ☆89Jan 4, 2023Updated 3 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Vulnerability knowledge graph construction☆30Dec 24, 2022Updated 3 years ago
- A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports☆30Aug 21, 2023Updated 2 years ago
- Replication package for the paper "Automatic Mapping of Unstructured Cyber Threat Intelligence: An Experimental Study" published at the I…☆58Aug 29, 2022Updated 3 years ago
- ☆21Dec 22, 2021Updated 4 years ago
- Brain Tumor Detection with TransferLearning (VGG16, MobileNet, ResNet50, InceptionV3)☆12Jul 1, 2023Updated 2 years ago
- 🚨ATTENTION🚨 The CVE mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here as…☆242Apr 3, 2024Updated 2 years ago
- "Linking Threat Tactics, Techniques, and Patterns with Defensive Weaknesses, Vulnerabilities and Affected Platform Configurations for Cyb…☆106Nov 9, 2025Updated 5 months ago
- State of vulnerabilties report☆11Feb 20, 2020Updated 6 years ago
- This GitHub Action creates a GitHub contribution calendar on a 3D profile image.☆12Nov 10, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆11Mar 24, 2025Updated last year
- ☆12Mar 23, 2024Updated 2 years ago
- ☆12Nov 19, 2025Updated 4 months ago
- ⚠️ ARCHIVED**: This repository is no longer actively maintained. All Sigma rules are now managed and available in SIEM Rules☆12Mar 19, 2026Updated 3 weeks ago
- A network discrete event simulator for peer-to-peer network modeling.☆13Sep 1, 2019Updated 6 years ago
- Firebase C++ SDK☆12Aug 15, 2024Updated last year
- Turn a supported list of filetypes (e.g. .docx) into a markdown structured text file. Also optionally defangs indicators and extract text…☆12Mar 17, 2026Updated 3 weeks ago
- This repository holds the data, source code and resulting model weights for the paper "Towards end-to-end Cyberthreat Detection from Twit…☆17Sep 14, 2021Updated 4 years ago
- Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogue…☆92Mar 2, 2026Updated last month
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Automating Cyber Threat Intelligence Reporting with Natural Language Generation☆15Jan 24, 2024Updated 2 years ago
- Python code to automatically produce a summary of a piece of text.☆12Sep 8, 2016Updated 9 years ago
- MulVAL interaction rules and their mapping to MITRE ATT&CK Techniques☆13Oct 21, 2024Updated last year
- Signal SNR, periodicity, despike, and time registration accommodating N time series☆12Jun 21, 2017Updated 8 years ago
- Code from the paper: Neurlux: Dynamic Malware Analysis Without Feature Engineering☆13Dec 27, 2020Updated 5 years ago
- Graph database version of the CVE database☆26Dec 8, 2022Updated 3 years ago
- The MITRE ATT&CK Mapping Datasets☆20Jan 23, 2024Updated 2 years ago
- Solutions to assignments in course- "Bitcoin and Cryptocurrency Technologies", offered by coursera, Princeton University☆11Jun 28, 2018Updated 7 years ago
- ☆15Jun 21, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Example application for the task of fine-tuning pretrained machine translation models on highly domain-specific, self-extracted translate…☆17May 4, 2025Updated 11 months ago
- ☆12Aug 15, 2023Updated 2 years ago
- Generative AI-based CyberSecurity-focused Prompt Dataset for Benchmarking Large Language Models☆36Jan 14, 2025Updated last year
- A Common Weakness Enumeration (CWE) Node.js SDK compliant with MITRE / CAPEC☆32Feb 4, 2026Updated 2 months ago
- ☆17Oct 19, 2023Updated 2 years ago
- SECURE: Benchmarking Generative Large Language Models as a Cyber Advisory☆17Aug 28, 2024Updated last year
- A comprehensive and accurate emulation of Bitcoin network implementation☆14Nov 1, 2022Updated 3 years ago