buptlhh's Stars
readerbench/CVE2ATT-CK
CVE2ATT&CK: BERT-based mapping of CVEs to MITRE ATT&CK Techniques
XingGao-cn/NEGSC
This paper propose a self-supervised graph representing learning method named NEGSC, to identify the types of network intrusion attacks for edge-sensitive net flow traffic.
musimathicslab/network-intrusion-detection-gnn
:computer: Network System Intrusion Detection using Graph Neural Networks
genggui001/Megatron-DeepSpeed-Llama
jmhIcoding/flowcontainer
从pcap获取流的基本信息工具
OTRF/OSSEM-DM
OSSEM Detection Model
Netsec-SJTU/LLM-TIKG-dataset
A labeled dataset used for the knowledge graph construction.
Clouditera/SecGPT
SecGPT网络安全大模型
OTRF/Security-Datasets
Re-play Security Events
mitre-attack/car
Cyber Analytics Repository
hwwang55/KGCN
A tensorflow implementation of Knowledge Graph Convolutional Networks
OTRF/ThreatHunter-Playbook
A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more efficient.
OTRF/OSSEM
Open Source Security Events Metadata (OSSEM)
UraSecTeam/mordor
Re-play Adversarial Techniques
mitre-attack/bzar
A set of Zeek scripts to detect ATT&CK techniques.
mitre-attack/mitreattack-python
A python module for working with ATT&CK
mitre-attack/attack-stix-data
STIX data representing MITRE ATT&CK
aptnotes/data
APTnotes data
nlpai-lab/CTI-reports-dataset
P3t3rp4rk3r/Threat_Intelligence
Threat-Intelligence Feeds & Tools & Frameworks
l0renor/Relation-Extraction-and-Knowledge-Graph-Generation-on-MISP-Event-Reports
mitre/cti
Cyber Threat Intelligence Repository expressed in STIX 2.0
hslatman/awesome-threat-intelligence
A curated list of Awesome Threat Intelligence resources
luoluoluoyl/relation_extract_dataset
CVEProject/cvelist
Pilot program for CVE submission through GitHub. CVE Record Submission via Pilot PRs ending 6/30/2023
li-zhenyuan/Knowledge-enhanced-Attack-Graph
AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports
ndionysus/multitask-cyberthreat-detection
This repository holds the data, source code and resulting model weights for the paper "Towards end-to-end Cyberthreat Detection from Twitter using Multi-Task Learning" to be presented at IJCNN 2020.