xashru / cti-benchView external linksLinks
☆81Nov 5, 2025Updated 3 months ago
Alternatives and similar repositories for cti-bench
Users that are interested in cti-bench are comparing it to the libraries listed below
Sorting:
- AnnoCTR corpus for detection and linking of entities in cyber threat reports☆26Apr 12, 2024Updated last year
- CyberMetric dataset☆114Jan 1, 2025Updated last year
- A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports☆28Aug 21, 2023Updated 2 years ago
- ☆10Jan 21, 2019Updated 7 years ago
- Prevent cloud misconfigurations during build-time for Terraform, Cloudformation, Kubernetes, Serverless framework, and other infrastructu…☆11Jan 13, 2026Updated last month
- Optimize the utilization of GHAS licenses in an enterprise (or organization)☆15Oct 8, 2025Updated 4 months ago
- Data for CyberSOCEval, an LLM benchmark by Meta & CrowdStrike☆18Sep 22, 2025Updated 4 months ago
- MALOnt - an ontology for Malware Threat Intelligence.☆13Jul 8, 2021Updated 4 years ago
- Side-channel Analysis☆19May 17, 2022Updated 3 years ago
- Evolving fuzzers with large language models☆17Dec 14, 2023Updated 2 years ago
- ☆15Jul 25, 2025Updated 6 months ago
- Decompiler Fuzzing Test with EMI mutation☆16Apr 23, 2020Updated 5 years ago
- A compiler for the Meta Attack Language☆15Apr 11, 2022Updated 3 years ago
- Collection of videos of Raids on Cybercriminals☆21Mar 19, 2025Updated 10 months ago
- SECURE: Benchmarking Generative Large Language Models as a Cyber Advisory☆15Aug 28, 2024Updated last year
- stix-icons is a collection of colourful and clean icons for use in software, training and marketing material to visualize cyber threats a…☆37Dec 15, 2022Updated 3 years ago
- ☆21Aug 22, 2022Updated 3 years ago
- Machine Learning for Source Code Analysis☆17Nov 20, 2023Updated 2 years ago
- Cyber attack attribution is the process of attempting to trace back a piece of code or malware to a perpetrator of a cyberattack. As cybe…☆15Jan 15, 2021Updated 5 years ago
- A tool based on python to parse C/C++ code into code property graph☆17Nov 4, 2022Updated 3 years ago
- CyberBench: A Multi-Task Cyber LLM Benchmark☆30Apr 29, 2025Updated 9 months ago
- [AST'26] LLAMAFUZZ: Large Language Model Enhanced Greybox Fuzzing☆23Dec 3, 2024Updated last year
- Utilities for constructing a large dataset of LLVM IR☆25Jun 2, 2025Updated 8 months ago
- A security-oriented static binary analysis tool for comparing the quantity and quality of code reuse gadget sets in program variants.☆17Oct 13, 2023Updated 2 years ago
- Mutation-guided mutation-based fuzz testing☆51Jul 13, 2024Updated last year
- CS-Eval is a comprehensive evaluation suite for fundamental cybersecurity models or large language models' cybersecurity ability.☆59Nov 27, 2024Updated last year
- Replication package for the paper "Automatic Mapping of Unstructured Cyber Threat Intelligence: An Experimental Study" published at the I…☆57Aug 29, 2022Updated 3 years ago
- Run CodeQL queries at scale using Multi-Repository Variant Analysis (MRVA)☆61Apr 16, 2025Updated 9 months ago
- ☆55Oct 4, 2024Updated last year
- Process Orchestration Framework: A camunda 7 fork☆20Updated this week
- ☆19Jan 2, 2021Updated 5 years ago
- ☆193Dec 13, 2025Updated 2 months ago
- ☆27Nov 30, 2018Updated 7 years ago
- Python GUI for seeing what's happening inside a fuzzer☆26Oct 1, 2021Updated 4 years ago
- FastKLEE: Faster Symbolic Execution via Reducing Redundant Bound Checking of Type-Safe Pointers☆22May 31, 2023Updated 2 years ago
- Supporting Materials for “Symbolic Triage” blog post☆24Oct 31, 2022Updated 3 years ago
- Knowledge Report Alert & Normalization Generator☆26Updated this week
- [USENIX Security '24] An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models: Injecting Disguised Vulnerabilities agai…☆56Mar 22, 2025Updated 10 months ago
- ☆22Nov 17, 2020Updated 5 years ago