Stars
3
stars
written in Jupyter Notebook
Clear filter
Data mining, machine learning, and deep learning sample code
CVE2ATT&CK: BERT-based mapping of CVEs to MITRE ATT&CK Techniques
A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.