tmylla / HackMentor
The repository of paper "HackMentor: Fine-Tuning Large Language Models for Cybersecurity".
☆96Updated 5 months ago
Related projects ⓘ
Alternatives and complementary repositories for HackMentor
- This project aims to consolidate and share high-quality resources and tools across the cybersecurity domain.☆80Updated last month
- ☆30Updated 4 months ago
- CyberMetric dataset☆54Updated 2 months ago
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆138Updated last year
- ☆79Updated 7 months ago
- 本项目通过大模型联动爬虫,检索Github上所有存有有价值漏洞信息与漏洞POC或规则信息的项目,并自动识别项目的目录结构、Readme信息后进行总结分析并分类,所汇总的项目可以帮助安全行业从业者收集漏洞信息、POC信息、规则等。☆88Updated 10 months ago
- This resource mainly counts papers related to APT attacks, including APT traceability, APT knowledge graph construction, APT malicious sa…☆199Updated 6 months ago
- 该资源是各种溯源图相关的论文和资源总结(含PPT),涉及APT攻击检测、入侵检测、流量日志检测、系统安全等领域,希望对大家有所帮助~☆144Updated last year
- AutoAudit—— the LLM for Cyber Security 网络安全大语言模型☆260Updated this week
- 塑造未来的安全领域智能革命☆590Updated this week
- This is a benchmark for evaluating the vulnerability discovery ability of automated approaches including Large Language Models (LLMs), de…☆60Updated last week
- Vulnerability knowledge graph construction☆20Updated last year
- SecureBERT is a domain-specific language model to represent cybersecurity textual data.☆71Updated 4 months ago
- Towards the Detection of Inconsistencies in Public Security Vulnerability Reports☆75Updated 2 years ago
- Awesome Large Language Models for Vulnerability Detection☆38Updated this week
- Source Code Vulnerability Detection Tools(SCVDT)provides a vulnerable code database, vulnerability detection service for Java and C/C++ p…☆110Updated 3 years ago
- ATLAS: A Sequence-based Learning Approach for Attack Investigation☆142Updated 2 years ago
- APT-KGL: An Intelligent APT Detection System Based on Threat Knowledge and Heterogeneous Provenance Graph Learning☆59Updated 2 years ago
- Source code of Malware Classification by Learning Semantic and Structural Features of Control Flow Graphs (TrustCom 2021)☆18Updated 2 years ago
- Ai与Web安全相关资料的总结库,包括认为写的比较好的一些博客、项目、数据等☆75Updated 2 years ago
- A Test Project for a Network Security-oriented LLM Tool Emulating AutoGPT☆263Updated last year
- Extracting Attack Behavior from Threat Reports☆75Updated last year
- SecLLMHolmes is a generalized, fully automated, and scalable framework to systematically evaluate the performance (i.e., accuracy and rea…☆39Updated 2 weeks ago
- An overview of LLMs for cybersecurity.☆452Updated 2 months ago
- 一个搜索网络安全领域顶会论文的小工具☆58Updated 3 weeks ago
- 利用知识图谱分析网络安全事件☆39Updated 4 years ago
- SHADEWATCHER: Recommendation-guided Cyber Threat Analysis using System Audit Records, Oakland'22☆77Updated last year
- pretrained BERT model for cyber security text, learned CyberSecurity Knowledge☆159Updated last year
- ☆73Updated last year
- AI Model Security Reading Notes☆35Updated 3 months ago