☆54Jul 3, 2024Updated last year
Alternatives and similar repositories for LLMParser
Users that are interested in LLMParser are comparing it to the libraries listed below
Sorting:
- Demonstration-Free: Towards More Practical Log Parsing with Large Language Models☆26Jun 17, 2025Updated 8 months ago
- ☆18Dec 30, 2025Updated 2 months ago
- LILAC: Log Parsing using LLMs with Adaptive Parsing Cache [FSE'24]☆71Feb 3, 2024Updated 2 years ago
- ☆95Nov 6, 2024Updated last year
- [AAAI 2024] LogFormer: A Pre-train and Tuning Pipeline for Log Anomaly Detection☆51May 27, 2024Updated last year
- Code for the ISSRE-2024 Research Track paper: Leveraging RAG-Enhanced Large Language Model for Semi-Supervised Log Anomaly Detection☆28Aug 26, 2024Updated last year
- From Task-based to Instruction-based Automated Log Analysis☆22Jan 7, 2025Updated last year
- Log Analyzer chatbot☆35Aug 28, 2024Updated last year
- Unsupervised Anomaly Detection System for Univariate Time Series☆20Sep 25, 2024Updated last year
- Codee☆17Dec 9, 2020Updated 5 years ago
- Machine learning on knowledge graphs for context-aware security monitoring (data and model)☆18Mar 11, 2022Updated 3 years ago
- A embedding method for Cyber Threat Intelligence☆22Dec 2, 2018Updated 7 years ago
- Log Parsing with Prompt-based Few-shot Learning (ICSE 2023, Technical Track)☆72Sep 10, 2025Updated 5 months ago
- Code for "Pre-training with Contrastive Learning for Unified Log Analytics"☆20Jan 22, 2024Updated 2 years ago
- Analysis scripts for log data sets used in anomaly detection.☆85Oct 19, 2025Updated 4 months ago
- SMET : Semantic Mapping of CVE to ATT&CK and its Application to Cybersecurity☆52Sep 14, 2024Updated last year
- ☆45Jul 10, 2023Updated 2 years ago
- Log Parsing: How Far Can ChatGPT Go? (ASE 2023 - NIER Track)☆22Dec 7, 2023Updated 2 years ago
- Linux based vulnerabilities (CVE) exploit detection through runtime security using Falco/Osquery/Yara/Sigma☆21Nov 27, 2023Updated 2 years ago
- ☆31Feb 6, 2025Updated last year
- A benchmark for logging statement generation.☆26Nov 3, 2024Updated last year
- A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports☆28Aug 21, 2023Updated 2 years ago
- ☆31Sep 22, 2024Updated last year
- LogLLM: Log-based Anomaly Detection Using Large Language Models (system log anomaly detection)☆177Dec 9, 2025Updated 2 months ago
- Python utilities☆18May 25, 2025Updated 9 months ago
- A Large-scale Evaluation for Log Parsing Techniques: How Far are We? [ISSTA'24]☆135Oct 8, 2025Updated 4 months ago
- The repository consists of : Construction of the corpus, Named Entity Recognition , Relationship Extraction , Construction of knowledge g…☆36Dec 5, 2022Updated 3 years ago
- ☆16Jul 7, 2025Updated 7 months ago
- headless-ida-mcp-server☆30Apr 4, 2025Updated 10 months ago
- A comprehensive repository for malware analysis and threat intelligence, including Cobalt Strike Beacon configurations, YARA rules, IOCs,…☆15Updated this week
- AutoLog: A Log Sequence Synthesis Framework for Anomaly Detection [ASE'23]☆41Feb 20, 2024Updated 2 years ago
- Red-Team - AI Agent to Phish Employees based on Social Intelligence.☆22Dec 28, 2025Updated 2 months ago
- easily parse environment variables☆11Jul 7, 2024Updated last year
- Python infrastructure to train paths selectors for symbolic execution engines.☆13Updated this week
- log anomaly detection via BERT☆342Jun 21, 2024Updated last year
- ☆42Sep 29, 2024Updated last year
- ☆42Jan 5, 2026Updated last month
- Cybersecurity Ontology (CyberOnto) and Situational Awareness (CyberSA) help teamwork in Cyber Incident Responses, Control, Containment, a…☆10Sep 15, 2022Updated 3 years ago
- Deploy Yolo series algorithms on Hisilicon platform hi3516, including yolov3, yolov5, yolox, etc☆11Mar 25, 2022Updated 3 years ago