lzhz2012's Stars
PacktPublishing/Mastering-Metasploit-Third-Edition
Mastering Metasploit - Third Edition, published by Packt
rapid7/metasploit-framework
Metasploit Framework
NaiboWang/EasySpider
A visual no-code/code-free web crawler/spider易采集:一个可视化浏览器自动化测试/数据采集/爬虫软件,可以无代码图形化的设计和执行爬虫任务。别名:ServiceWrapper面向Web应用的智能化服务封装系统。
mitre/cti
Cyber Threat Intelligence Repository expressed in STIX 2.0
mitre-attack/mitreattack-python
A python module for working with ATT&CK
Threezh1/JSFinder
JSFinder is a tool for quickly extracting URLs and subdomains from JS files on a website.
Significant-Gravitas/AutoGPT
AutoGPT is the vision of accessible AI for everyone, to use and to build on. Our mission is to provide the tools, so that you can focus on what matters.
Clouditera/SecGPT
SecGPT网络安全大模型
LlamaFamily/Llama-Chinese
Llama中文社区,Llama3在线体验和微调模型已开放,实时汇总最新Llama3学习资料,已将所有代码更新适配Llama3,构建最好的中文Llama大模型,完全开源可商用
krahets/hello-algo
《Hello 算法》:动画图解、一键运行的数据结构与算法教程。支持 Python, Java, C++, C, C#, JS, Go, Swift, Rust, Ruby, Kotlin, TS, Dart 代码。简体版和繁体版同步更新,English version ongoing
risksense/mulval
A logic-based enterprise network security analyzer
CAT-Cyber-Attack-ToolChain/CAT
Cyber attack toolchain integrating MulVAL
Qingtian-Zou/rule_generation
Automatic MulVAL rule generation.
leelening/MulVAL-to-pddl
dtayouri/MulVAL-MITRE
MulVAL interaction rules and their mapping to MITRE ATT&CK Techniques
CVEProject/cvelistV5
CVE cache of the official CVE List in CVE JSON 5 format
tumi8/INSALATA
IT NetworkS AnaLysis And deploymenT Application
mitre/caldera
Automated Adversary Emulation Platform
THUDM/CodeGeeX2
CodeGeeX2: A More Powerful Multilingual Code Generation Model
has2k1/plotnine-examples
Jupyter Notebooks that are part of the plotnine documentation
pstavirs/ostinato
Ostinato - Packet/Traffic Generator and Analyzer
unfetter-discover/unfetter-insight
Unfetter Insight performs natural language processing and analysis for text data to determine and convert to CTI Stix data automatically.
vlegoy/rcATT
A python app to predict Att&ck tactics and techniques from cyber threat reports
wgwang/awesome-LLMs-In-China
**大模型
dessertlab/cti-to-mitre-with-nlp
Replication package for the paper "Automatic Mapping of Unstructured Cyber Threat Intelligence: An Experimental Study" published at the IEEE International Symposium on Software Reliability Engineering (ISSRE) 2022
jackaduma/SecBERT
pretrained BERT model for cyber security text, learned CyberSecurity Knowledge
li-zhenyuan/Knowledge-enhanced-Attack-Graph
AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports
zjukg/NeuralKG
[Tool] For Knowledge Graph Representation Learning
lorddemon/CVE-2021-41773-PoC
Metarget/metarget
Metarget is a framework providing automatic constructions of vulnerable infrastructures.