The MITRE ATT&CK Mapping Datasets
☆21Jan 23, 2024Updated 2 years ago
Alternatives and similar repositories for mitre-ttp-mapping
Users that are interested in mitre-ttp-mapping are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- AnnoCTR corpus for detection and linking of entities in cyber threat reports☆29Apr 12, 2024Updated 2 years ago
- TTPDrill focuses on developing automated and context-aware analytics of cyber threat intelligence to accurately learn attack patterns (TT…☆28May 29, 2020Updated 5 years ago
- This repository is the tutorial for the IsitObservable Episode on Fluentd☆11May 7, 2025Updated last year
- ☆16May 15, 2026Updated last week
- AI featured threat modeling and security review project☆17Nov 17, 2024Updated last year
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- security course list☆14Sep 18, 2015Updated 10 years ago
- Scripts for examples in the lectures notes for Optimal Control and Estimation☆12Nov 14, 2023Updated 2 years ago
- Contextual Deserialization vulnerability that causes RCE - Remote Code Execution☆14Apr 28, 2024Updated 2 years ago
- ☆11May 3, 2019Updated 7 years ago
- Few-Shot Relation Extraction with AllenNLP☆12Jan 27, 2019Updated 7 years ago
- An extension for Burp's Web Vulnerability Scanner that can detect API discovery metadata and extract data useful during recon.☆19Sep 13, 2025Updated 8 months ago
- The Security Toolkit for managing Generative AI(especially LLMs) and Supervised Learning processes(Learning and Inference).☆23Jun 25, 2025Updated 10 months ago
- Insecure Deserialization, PDF and lab☆18Nov 19, 2019Updated 6 years ago
- ☆14Jul 14, 2020Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- EvenBetterExtensions allows you to quicky install and keep updated Caido extensions.☆22Sep 26, 2024Updated last year
- Implementation of our paper "Injecting Knowledge Base Information into End-to-End Joint Entity and Relation Extraction and Coreference Re…☆10Jan 22, 2022Updated 4 years ago
- ☆50Apr 1, 2025Updated last year
- Micro-agent framework for Caido☆30Sep 4, 2025Updated 8 months ago
- ☆10Jan 21, 2019Updated 7 years ago
- Code Repository for Paper "HRGCN: Heterogeneous Graph-level Anomaly Detection with Hierarchical Relation-augmented Graph Neural Networks"☆16Sep 24, 2023Updated 2 years ago
- Bayesian Massive MIMO Channel Estimation with Parameter Estimation using Low-Resolution ADCs☆14May 23, 2022Updated 4 years ago
- TRAM is an open-source platform designed to advance research into automating the mapping of cyber threat intelligence reports to MITRE AT…☆564May 6, 2025Updated last year
- Guided Differential Fuzzing for HTTP Request Parsing Discrepancies☆20Apr 11, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Code for labeling malicious powershell events in the fiveeyes Darpa OPTC dataset☆12Jun 22, 2023Updated 2 years ago
- RENet is a deep learning tensorflow2.0 model for classify ATT&CK techniques and tactics for cyber threat intelligence with relevance enha…☆12Jan 11, 2023Updated 3 years ago
- MALOnt - an ontology for Malware Threat Intelligence.☆13Jul 8, 2021Updated 4 years ago
- Code of the CMNLN model☆13Nov 6, 2021Updated 4 years ago
- A small collection of scripts I use when reversing mobile applications.☆21May 1, 2020Updated 6 years ago
- A basic Bug Bounty target monitoring tool based on Discord Bot☆24Jan 30, 2025Updated last year
- Graphs in Cybersecurity - Bloodhound☆21Oct 8, 2024Updated last year
- Repository for accompanying materials to Threat Knowledge Graphs.☆21Jul 16, 2025Updated 10 months ago
- MulVAL is an cybersecurity reasoning engine that can be applied on top of multiple contexts (cloud, IoT, enterprise network, etc )☆11Feb 23, 2016Updated 10 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- 基于python3训练中文wiki词向量、字向量、拼音向量☆11Jan 2, 2022Updated 4 years ago
- 中文实体关系联合抽取baseline☆12Jun 23, 2019Updated 6 years ago
- Focusing on potential named entities during active label acquisition.☆10Oct 8, 2024Updated last year
- Visual Cypher Query Builder☆25Jan 10, 2025Updated last year
- pySCM: The Set Covering Machine in Python☆16Apr 18, 2025Updated last year
- A dataset of news headlines for detecting causalities☆14May 9, 2022Updated 4 years ago
- SEETF 2023 Public Challenge Files, Sources, and Solutions☆18Jun 18, 2023Updated 2 years ago