Hugging Face's logo Hugging Face
  • Models
  • Datasets
  • Spaces
  • Buckets new
  • Docs
  • Enterprise
  • Pricing

  • Log In
  • Sign Up

acedev003
/
gte-small-mitre

Sentence Similarity
sentence-transformers
Safetensors
bert
feature-extraction
Generated from Trainer
dataset_size:29440
loss:MultipleNegativesRankingLoss
text-embeddings-inference
Model card Files Files and versions
xet
Community

Instructions to use acedev003/gte-small-mitre with libraries, inference providers, notebooks, and local apps. Follow these links to get started.

  • Libraries
  • sentence-transformers

    How to use acedev003/gte-small-mitre with sentence-transformers:

    from sentence_transformers import SentenceTransformer
    
    model = SentenceTransformer("acedev003/gte-small-mitre")
    
    sentences = [
        "Olympic Destroyer uses PsExec to interact with the ADMIN$ network share to execute commands on remote systems.",
        "Adversaries may target user email to collect sensitive information. Emails may contain sensitive data, including trade secrets or personal information, that can prove valuable to adversaries. Adversaries can collect or forward email from mail servers or clients. ",
        "Adversaries can hide a program's true filetype by changing the extension of a file. With certain file types (specifically this does not work with .app extensions), appending a space to the end of a filename will change how the file is processed by the operating system.For example, if there is a Mach-O executable file called <code>evil.bin</code>, when it is double clicked by a user, it will launch Terminal.app and execute. If this file is renamed to <code>evil.txt</code>, then when double clicked by a user, it will launch with the default text editing application (not executing the binary). However, if the file is renamed to <code>evil.txt </code> (note the space at the end), then when double clicked by a user, the true file type is determined by the OS and handled appropriately and the binary will be executed (Citation: Mac Backdoors are back).Adversaries can use this feature to trick users into double clicking benign-looking files of any format and ultimately executing something malicious.",
        "Adversaries may use [Valid Accounts](https://attack.mitre.org/techniques/T1078) to log into a service that accepts remote connections, such as telnet, SSH, and VNC. The adversary may then perform actions as the logged-on user.In an enterprise environment, servers and workstations can be organized into domains. Domains provide centralized identity management, allowing users to login using one set of credentials across the entire network. If an adversary is able to obtain a set of valid domain credentials, they could login to many different machines using remote access protocols such as secure shell (SSH) or remote desktop protocol (RDP).(Citation: SSH Secure Shell)(Citation: TechNet Remote Desktop Services) They could also login to accessible SaaS or IaaS services, such as those that federate their identities to the domain. Legitimate applications (such as [Software Deployment Tools](https://attack.mitre.org/techniques/T1072) and other administrative programs) may utilize [Remote Services](https://attack.mitre.org/techniques/T1021) to access remote hosts. For example, Apple Remote Desktop (ARD) on macOS is native software used for remote management. ARD leverages a blend of protocols, including [VNC](https://attack.mitre.org/techniques/T1021/005) to send the screen and control buffers and [SSH](https://attack.mitre.org/techniques/T1021/004) for secure file transfer.(Citation: Remote Management MDM macOS)(Citation: Kickstart Apple Remote Desktop commands)(Citation: Apple Remote Desktop Admin Guide 3.3) Adversaries can abuse applications such as ARD to gain remote code execution and perform lateral movement. In versions of macOS prior to 10.14, an adversary can escalate an SSH session to an ARD session which enables an adversary to accept TCC (Transparency, Consent, and Control) prompts without user interaction and gain access to data.(Citation: FireEye 2019 Apple Remote Desktop)(Citation: Lockboxx ARD 2019)(Citation: Kickstart Apple Remote Desktop commands)"
    ]
    embeddings = model.encode(sentences)
    
    similarities = model.similarity(embeddings, embeddings)
    print(similarities.shape)
    # [4, 4]
  • Notebooks
  • Google Colab
  • Kaggle
gte-small-mitre
134 MB
Ctrl+K
Ctrl+K
  • 1 contributor
History: 2 commits
acedev003's picture
acedev003
Add new SentenceTransformer model.
4e4d33c verified over 1 year ago
  • 1_Pooling
    Add new SentenceTransformer model. over 1 year ago
  • .gitattributes
    1.52 kB
    initial commit over 1 year ago
  • README.md
    41.9 kB
    Add new SentenceTransformer model. over 1 year ago
  • config.json
    624 Bytes
    Add new SentenceTransformer model. over 1 year ago
  • config_sentence_transformers.json
    195 Bytes
    Add new SentenceTransformer model. over 1 year ago
  • model.safetensors
    133 MB
    xet
    Add new SentenceTransformer model. over 1 year ago
  • modules.json
    349 Bytes
    Add new SentenceTransformer model. over 1 year ago
  • sentence_bert_config.json
    53 Bytes
    Add new SentenceTransformer model. over 1 year ago
  • special_tokens_map.json
    695 Bytes
    Add new SentenceTransformer model. over 1 year ago
  • tokenizer.json
    712 kB
    Add new SentenceTransformer model. over 1 year ago
  • tokenizer_config.json
    1.43 kB
    Add new SentenceTransformer model. over 1 year ago
  • vocab.txt
    232 kB
    Add new SentenceTransformer model. over 1 year ago