☆81Feb 11, 2026Updated 3 weeks ago
Alternatives and similar repositories for cti-bench
Users that are interested in cti-bench are comparing it to the libraries listed below
Sorting:
- AnnoCTR corpus for detection and linking of entities in cyber threat reports☆27Apr 12, 2024Updated last year
- CyberMetric dataset☆115Jan 1, 2025Updated last year
- A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports☆28Aug 21, 2023Updated 2 years ago
- ☆10Jul 9, 2020Updated 5 years ago
- ☆10Jan 21, 2019Updated 7 years ago
- Prevent cloud misconfigurations during build-time for Terraform, Cloudformation, Kubernetes, Serverless framework, and other infrastructu…☆11Jan 13, 2026Updated last month
- Optimize the utilization of GHAS licenses in an enterprise (or organization)☆15Feb 12, 2026Updated 3 weeks ago
- [ICSE'25] Specialized Fuzzing for LLVM Backend Code Generation☆21Mar 26, 2025Updated 11 months ago
- Side-channel Analysis☆19May 17, 2022Updated 3 years ago
- ☆15Jul 25, 2025Updated 7 months ago
- Decompiler Fuzzing Test with EMI mutation☆16Apr 23, 2020Updated 5 years ago
- MALOnt - an ontology for Malware Threat Intelligence.☆13Jul 8, 2021Updated 4 years ago
- Evolving fuzzers with large language models☆17Dec 14, 2023Updated 2 years ago
- SECURE: Benchmarking Generative Large Language Models as a Cyber Advisory☆15Aug 28, 2024Updated last year
- A compiler for the Meta Attack Language☆15Apr 11, 2022Updated 3 years ago
- stix-icons is a collection of colourful and clean icons for use in software, training and marketing material to visualize cyber threats a…☆38Dec 15, 2022Updated 3 years ago
- Machine Learning for Source Code Analysis☆17Nov 20, 2023Updated 2 years ago
- ☆21Aug 22, 2022Updated 3 years ago
- A tool based on python to parse C/C++ code into code property graph☆17Nov 4, 2022Updated 3 years ago
- Cyber attack attribution is the process of attempting to trace back a piece of code or malware to a perpetrator of a cyberattack. As cybe…☆15Jan 15, 2021Updated 5 years ago
- Detection of malicious prompts used to exploit large language models (LLMs) by leveraging supervised machine learning classifiers.☆20Oct 30, 2024Updated last year
- [AST'26] LLAMAFUZZ: Large Language Model Enhanced Greybox Fuzzing☆23Dec 3, 2024Updated last year
- A security-oriented static binary analysis tool for comparing the quantity and quality of code reuse gadget sets in program variants.☆17Oct 13, 2023Updated 2 years ago
- ☆20Feb 20, 2026Updated 2 weeks ago
- CyberBench: A Multi-Task Cyber LLM Benchmark☆30Apr 29, 2025Updated 10 months ago
- Utilities for constructing a large dataset of LLVM IR☆25Jun 2, 2025Updated 9 months ago
- Mutation-guided mutation-based fuzz testing☆51Jul 13, 2024Updated last year
- CS-Eval is a comprehensive evaluation suite for fundamental cybersecurity models or large language models' cybersecurity ability.☆60Nov 27, 2024Updated last year
- Replication package for the paper "Automatic Mapping of Unstructured Cyber Threat Intelligence: An Experimental Study" published at the I…☆58Aug 29, 2022Updated 3 years ago
- Run CodeQL queries at scale using Multi-Repository Variant Analysis (MRVA)☆61Apr 16, 2025Updated 10 months ago
- ☆19Jan 2, 2021Updated 5 years ago
- Caterpillar is a security scanning library for AI agent skill files (e.g., Claude Code skills) for dangerous or malicious behavior☆38Feb 16, 2026Updated 3 weeks ago
- ☆56Oct 4, 2024Updated last year
- Welcome to the hands-on resource hub for the Generative AI Development Environments Bootcamp. This repo is designed to help you explore d…☆25Oct 22, 2025Updated 4 months ago
- Intel Retrieval Augmented Generation (RAG) Utilities☆91Jan 29, 2024Updated 2 years ago
- FastKLEE: Faster Symbolic Execution via Reducing Redundant Bound Checking of Type-Safe Pointers☆23May 31, 2023Updated 2 years ago
- Python GUI for seeing what's happening inside a fuzzer☆26Oct 1, 2021Updated 4 years ago
- Supporting Materials for “Symbolic Triage” blog post☆24Oct 31, 2022Updated 3 years ago
- Knowledge Report Alert & Normalization Generator☆26Feb 11, 2026Updated 3 weeks ago