helloworldzly
Receive Ph.D degree from Tsinghua and now work as a postdoc researcher in PCL, focusing on Cyber Network Security and Blockchain.
Peng Cheng Laboratory, Tsinghua University, Sun Yet-sen UniversityChina
helloworldzly's Stars
OptimalScale/LMFlow
An Extensible Toolkit for Finetuning and Inference of Large Foundation Models. Large Models for All.
rabobank-cdc/DeTTECT
Detect Tactics, Techniques & Combat Threats
corca-ai/awesome-llm-security
A curation of awesome tools, documents and projects about LLM Security.
saltudelft/ml4se
A curated list of papers, theses, datasets, and tools related to the application of Machine Learning for Software Engineering
benman1/generative_ai_with_langchain
Build large language model (LLM) apps with Python, ChatGPT and other models. This is the companion repository for the book on generative AI with LangChain.
nforest/awesome-decompilation
A curated list of awesome decompilation resources and projects.
EvilPsyCHo/Play-with-LLMs
Tutorial on training, evaluating LLM, as well as utilizing RAG, Agent, Chain to build entertaining applications with LLMs.分享如何训练、评估LLMs,如何基于RAG、Agent、Chain构建有趣的LLMs应用。
SystemSecurityStorm/Awesome-Binary-Similarity
An awesome & curated list of binary code similarity papers
tenable/awesome-llm-cybersecurity-tools
A curated list of large language model tools for cybersecurity research.
EulerSearch/embedding_studio
Embedding Studio is a framework which allows you transform your Vector Database into a feature-rich Search Engine.
linwhitehat/ET-BERT
The repository of ET-BERT, a network traffic classification model on encrypted traffic. The work has been accepted as The Web Conference (WWW) 2022 accepted paper.
center-for-threat-informed-defense/attack_to_cve
🚨ATTENTION🚨 The CVE mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here as an archive.
emintham/Papers
Collection of papers read
eastmountyxz/AI-Security-Paper
This resource mainly counts papers related to APT attacks, including APT traceability, APT knowledge graph construction, APT malicious sample detection, and APT overview. Hope these summarized papers are helpful to you~
jmhIcoding/flowcontainer
从pcap获取流的基本信息工具
CMUSTRUDEL/DIRTY
DIRTY: Augmenting Decompiler Output with Learned Variable Names and Types
li-zhenyuan/Knowledge-enhanced-Attack-Graph
AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports
tmylla/HackMentor
The repository of paper "HackMentor: Fine-Tuning Large Language Models for Cybersecurity".
jackaduma/ThreatReportExtractor
Extracting Attack Behavior from Threat Reports
CUMLSec/stateformer
evandowning/deepreflect
Discovering Malicious Functionality through Binary Reconstruction
sokcryptojacking/SoK
SoK: Cryptojacking Malware
basel-a/SMET
SMET : Semantic Mapping of CVE to ATT&CK and its Application to Cybersecurity
shbhmsingh72/Honeypot-Research-Papers
Mhackiori/STIXnet
A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports
readerbench/CVE2ATT-CK
CVE2ATT&CK: BERT-based mapping of CVEs to MITRE ATT&CK Techniques
buihuukhoi/CREME
CREME: A toolchain of automatic dataset collection for machine learning in intrusion detection
dapowan/Penetrative-AI
dstsmallbird/ChatGPT-VDMEval
Not The End of Story: An Evaluation of ChatGPT-Driven Vulnerability Description Mappings
Mhackiori/AGIR
Automating Cyber Threat Intelligence Reporting with Natural Language Generation