{"id":1283,"date":"2026-02-13T04:00:33","date_gmt":"2026-02-13T04:00:33","guid":{"rendered":"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/13\/ai-powered-knowledge-graph-generator-apts-thu-feb-12th\/"},"modified":"2026-02-13T04:00:33","modified_gmt":"2026-02-13T04:00:33","slug":"ai-powered-knowledge-graph-generator-apts-thu-feb-12th","status":"publish","type":"post","link":"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/13\/ai-powered-knowledge-graph-generator-apts-thu-feb-12th\/","title":{"rendered":"AI-Powered Knowledge Graph Generator &amp; APTs, (Thu, Feb 12th)"},"content":{"rendered":"<div>\n<h3>Unstructured text to interactive knowledge graph via LLM &amp; SPO triplet extraction<\/h3>\n<p>Courtesy of\u00a0<a href=\"https:\/\/tldr.tech\/infosec\">TLDR InfoSec<\/a>\u00a0Launches &amp; Tools again, another fine discovery in\u00a0<a href=\"https:\/\/github.com\/robert-mcdermott\">Robert McDermott\u2019s<\/a>\u00a0<a href=\"https:\/\/github.com\/robert-mcdermott\/ai-knowledge-graph\">AI Powered Knowledge Graph Generator<\/a>. Robert\u2019s system takes unstructured text, uses your preferred LLM and extracts knowledge in the form of Subject-Predicate-Object (SPO) triplets, then visualizes the relationships as an interactive knowledge graph.[1]<\/p>\n<p>Robert has documented AI Powered Knowledge Graph Generator (AIKG) beautifully, I\u2019ll not be regurgitating it needlessly, so please\u00a0<a href=\"https:\/\/github.com\/robert-mcdermott\/ai-knowledge-graph\">read<\/a>\u00a0further for details regarding features, requirements, configuration, and options. I will detail a few installation insights that got me up and running quickly.<br \/>\nThe feature summary is this:<br \/>\nAIKG automatically splits large documents into manageable chunks for processing and uses AI to identify entities and their relationships. As AIKG ensures consistent entity naming across document chunks, it discovers additional relationships between disconnected parts of the graph, then creates an interactive graph visualization. AIKG works with any OpenAI-compatible API endpoint; I used\u00a0<a href=\"https:\/\/ollama.com\/\">Ollama<\/a>\u00a0exclusively here with Google\u2019s Gemma 3, a lightweight family of models built on Gemini technology. Gemma 3 is multimodal, processing text and images, and is the current, most capable model that runs on a single GPU. I ran my experimemts on a Lenovo ThinkBook 14 G4 circa 2022 with an AMD Ryzen 7 5825U 8-core processor, Radeon Graphics, and 40gb memory running Ubuntu 24.04.3 LTS.<br \/>\nMy installation guidelines assume you have a full instance of Python3 and Ollama\u00a0<a href=\"https:\/\/ollama.com\/download\">installed<\/a>. My installation was implemented under my\u00a0<code>tools<\/code>\u00a0directory.<\/p>\n<pre tabindex=\"0\">\n<code data-lang=\"fallback\">python3 -m venv aikg # Establish a virtual environment for AIKG\ncd aikg\ngit clone https:\/\/github.com\/robert-mcdermott\/ai-knowledge-graph.git # Clone AIKG into virtual environment\nbin\/pip3 install -r ai-knowledge-graph\/requirements.txt # Install AIKG requirements\nbin\/python3 ai-knowledge-graph\/generate-graph.py --help # Confirm AIKG installation is functional\nollama pull gemma3 # Pull the Gemma 3 model from Ollama\n<\/code><\/pre>\n<p>I opted to test AIKG via a couple of articles specific to Russian state-sponsored adversarial cyber campaigns as input:<\/p>\n<ul>\n<li>CISA\u2019s Cybersecurity Advisory\u00a0<a href=\"https:\/\/www.cisa.gov\/news-events\/cybersecurity-advisories\/aa25-141a\">Russian GRU Targeting Western Logistics Entities and Technology Companies<\/a>\u00a0May 2025<\/li>\n<li>SecurityWeek\u2019s\u00a0<a href=\"https:\/\/www.securityweek.com\/russias-apt28-targeting-energy-research-defense-collaboration-entities\/\">Russia\u2019s APT28 Targeting Energy Research, Defense Collaboration Entities<\/a>\u00a0January 2026<\/li>\n<\/ul>\n<p>My use of these articles in particular was based on the assertion that APT and nation state activity is often well represented via interactive knowledge graph. I\u2019ve advocated endlessly for visual link analysis and graph tech, including\u00a0<a href=\"https:\/\/holisticinfosec.io\/toolsmith\/pdf\/december2009\">Maltego<\/a>\u00a0(the OG of knowledge graph tools) at far back as 2009,\u00a0<a href=\"https:\/\/holisticinfosec.blogspot.com\/2015\/09\/toolsmith-108-visualizing-network-data.html\">Graphviz<\/a>\u00a0in 2015,\u00a0<a href=\"https:\/\/holisticinfosec.blogspot.com\/2018\/04\/toolsmith-132-helk-vs-aptsimulator-part.html\">GraphFrames<\/a>\u00a0in 2018 and\u00a0<a href=\"https:\/\/holisticinfosec.io\/post\/beagle-graph-transforms-dfir-data-logs\/\">Beagle<\/a>\u00a0in 2019. As always, visualization, coupled with entity relationship mappings, are an imperative for security analysts, threat hunters, and any security professional seeking deeper and more meaningful insights. While the SecurityWeek piece is a bit light on content and density, it served well as a good initial experiment.<br \/>\nThe CISA advisory is much more dense and served as an excellent, more extensive experiment.<br \/>\nI pulled them both into individual text files more easily ingested for processing with AIKG, shared for you\u00a0<a href=\"https:\/\/github.com\/holisticinfosec\/ai-knowledge-graph-files\">here<\/a>\u00a0if you\u2019d like to play along at home.<\/p>\n<p>Starting with SecurityWeek\u2019s\u00a0<a href=\"https:\/\/www.securityweek.com\/russias-apt28-targeting-energy-research-defense-collaboration-entities\/\">Russia\u2019s APT28 Targeting Energy Research, Defense Collaboration Entities<\/a>, and the subsequent\u00a0<a href=\"https:\/\/github.com\/holisticinfosec\/ai-knowledge-graph-files\/blob\/main\/Russia-APT28-targeting.txt\">Russia-APT28-targeting.txt<\/a>\u00a0file I created for model ingestion, I ran Gemma 3 as a 12 billion parameter model as follows:<\/p>\n<pre tabindex=\"0\">\n<code data-lang=\"gdscript3\">ollama run gemma3:12b # Run Gemma 3 locally as 12 billion parameter model\n~\/tools\/aikg\/bin\/python3 ~\/tools\/aikg\/ai-knowledge-graph\/generate-graph.py --config ~\/tools\/aikg\/ai-knowledge-graph\/config.toml -input data\/Russia-APT28-targeting.txt --output Russia-APT28-targeting-kg-12b.html\n<\/code><\/pre>\n<p>You may want or need to run Gemma 3 with fewer parameters depending on the performance and capabilities of your local system. Note that I am calling file paths rather explicitly to overcome complaints about missing config and input files.<br \/>\nThe article makes reference to APT credential harvesting activity targeting people associated with a Turkish energy and nuclear research agency, as well as a spoofed OWA login portal containing Turkish-language text to target Turkish scientists and researchers. As part of it\u2019s use of semantic triples (Subject-Predicate-Object (SPO) triplets), how does AIKG perform linking entities, attributes and values into machine readable statements [2] derived from the article content, as seen in\u00a0<strong>Figure 1<\/strong>?<\/p>\n<p><img decoding=\"async\" alt=\"AIKG 12b\" src=\"https:\/\/isc.sans.edu\/diaryimages\/images\/aikg12b(1).png\" style=\"width: 650px; height: 607px;\"><\/p>\n<p><strong>Figure 1:<\/strong>\u00a0AIKG Gemma 3:12b result from SecurityWeek article<\/p>\n<p>Quite well, I\u2019d say. To manipulate the graph, you may opt to disable physics in the graph output toolbar so you can tweak node placements. As drawn from the statistics view for this graph, AIKG generated 38 nodes, 105 edges, 52 extracted edges, 53 inferred edges, and four communities. You can further filter as you see fit, but even unfiltered, and with just a little by of tuning at the presentation layer, we can immediately see success where semantic triples immediately emerge to excellent effect. We can see entity\/relationship connections where, as an example,\u00a0<em>threat actor \u2013&gt; targeted \u2013&gt; people<\/em>\u00a0and\u00a0<em>people \u2013&gt; associated with \u2013&gt; think tanks<\/em>, with direct reference to the aforementioned OWA\u00a0<em>portal<\/em>\u00a0and Turkish language. If you\u2019re a cyberthreat intelligence analyst (CTI) or investigator, drawing visual conclusions derived from text processing will really help you step up your game in the form of context and enrichment in report writing. This same graph extends itself to represent the connection between the victims and the exploitation methods and infrastructure. If you don\u2019t want to go through a full installation process for yourself to complete your own model execution, you should still grab the\u00a0<a href=\"https:\/\/github.com\/holisticinfosec\/ai-knowledge-graph-files\">JSON and HTML output files<\/a>\u00a0and experiment with them in your browser. You\u2019ll get a real sense of the power and impact of an interactive knowledge graph with the joint forces power of LLM and SPO triplets.<br \/>\nFor a second experiment I selected related content in a longer, more in depth analysis courtesy of a CISA Cybersecurity\u00a0<a href=\"https:\/\/www.cisa.gov\/news-events\/cybersecurity-advisories\/aa25-141a\">Advisory<\/a>\u00a0(CISA friends, I\u2019m pulling for you in tough times). If you are following along at home, be sure to exit ollama so you can rerun it with additional parameters (27b vs 12b); pass\u00a0<code>\/bye<\/code>\u00a0as a message, and restart:<\/p>\n<pre tabindex=\"0\">\n<code data-lang=\"gdscript3\">ollama run gemma3:27b # Run Gemma 3 locally with 27 billion parameters\n~\/tools\/aikg\/bin\/python3 ~\/tools\/aikg\/ai-knowledge-graph\/generate-graph.py --config ~\/tools\/aikg\/ai-knowledge-graph\/config.toml --input ~\/tools\/aikg\/ai-knowledge-graph\/data\/Russian-GRU-Targeting-Logistics-Tech.txt --output Russian-GRU-Targeting-Logistics-Tech-kg-27b.html\n<\/code><\/pre>\n<p>Given the density and length of this article, the graph as initially rendered is a bit untenable (no fault of AIKG) and requires some tuning and filtering for optimal effect. Graph Statistics for this experiment included 118 nodes, 486 edges, 152 extracted edges, 334 inferred edges, and seven communities. To filter, with a focus again on actions taken by Russian APT operatives, I chose as follows:<\/p>\n<ul>\n<li>Select a Node by ID:\u00a0<em>threat actors<\/em><\/li>\n<li>Select a network item:\u00a0<em>Nodes<\/em><\/li>\n<li>Select a property:\u00a0<em>color<\/em><\/li>\n<li>Select value(s):\u00a0<em>#e41a1c<\/em>\u00a0(red)<\/li>\n<\/ul>\n<p>The result is more visually feasible, and allows ready tweaking to optimize network connections, as seen in\u00a0<strong>Figure 2<\/strong>.<\/p>\n<p><img decoding=\"async\" alt=\"AIKG 27b\" src=\"https:\/\/isc.sans.edu\/diaryimages\/images\/aikg27b.png\" style=\"width: 650px; height: 446px;\">???????<\/p>\n<p><strong>Figure 2:<\/strong>\u00a0AIKG Gemma 3:27b result from CISA advisory<\/p>\n<p>Shocking absolutely no one, we immediately encapsulate actor activity specific to credential access and influence operations via shell commands, Active Directory commands, and PowerShell commands. The conclusive connection is drawn however as\u00a0<em>threat actors \u2013&gt; targets \u2013&gt; defense industry<\/em>. Ya think? \ud83d\ude09 In the advisory, see Description of Targets, including defense industry, as well as Initial Access TTPs, including credential guessing and brute force, and finally Post-Compromise TTPs and Exfiltration regarding various shell and AD commands. As a security professional reading this treatise, its reasonable to assume you\u2019ve read a CISA Cybersecurity Advisory before. As such, its also reasonable to assume you\u2019ll agree that knowledge graph generation from a highly dense, content rich collection of IOCs and behaviors is highly useful. I intend to work with my workplace ML team to further incorporate the principles explored herein as part of our context and enrichment generation practices. I suggest you consider the same if you have the opportunity. While SPO triplets, aka semantic triples, are most often associated with search engine optimization (SEO), their use, coupled with LLM power, really shines for threat intelligence applications.<\/p>\n<p>Cheers\u2026until next time.<\/p>\n<p><a href=\"https:\/\/holisticinfosec.io\/\" target=\"_blank\">Russ McRee<\/a>\u00a0|\u00a0<a href=\"https:\/\/bsky.app\/profile\/holisticinfosec.bsky.social\" target=\"_blank\">@holisticinfosec<\/a>\u00a0|\u00a0<a href=\"https:\/\/infosec.exchange\/@holisticinfosec\">infosec.exchange\/@holisticinfosec<\/a>\u00a0|\u00a0<a href=\"https:\/\/www.linkedin.com\/in\/russmcree\/\">LinkedIn.com\/in\/russmcree<\/a><\/p>\n<p>Recommended reading and tooling:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.linkedin.com\/pulse\/semantic-triples-definition-function-components-benefits-reduan-nqmec\/\">Semantic Triples: Definition, Function, Components, Applications, Benefits, Drawbacks and Best Practices for SEO<\/a><\/li>\n<li><a href=\"https:\/\/www.cisa.gov\/news-events\/cybersecurity-advisories\/aa25-141a\">Russian GRU Targeting Western Logistics Entities and Technology Companies<\/a><\/li>\n<li><a href=\"https:\/\/www.securityweek.com\/russias-apt28-targeting-energy-research-defense-collaboration-entities\/\">Russia\u2019s APT28 Targeting Energy Research, Defense Collaboration Entities<\/a><\/li>\n<\/ul>\n<p><strong>References<\/strong><\/p>\n<p>[1] McDermott, R. (2025) AI Knowledge Graph. Available at:\u00a0<a href=\"https:\/\/github.com\/robert-mcdermott\/ai-knowledge-graph\">https:\/\/github.com\/robert-mcdermott\/ai-knowledge-graph<\/a>\u00a0(Accessed: 18 January 2026 &#8211; 11 February 2026).<br \/>\n[2] Reduan, M.H., (2025) Semantic Triples: Definition, Function, Components, Applications, Benefits, Drawbacks and Best Practices for SEO. Available at:\u00a0<a href=\"https:\/\/www.linkedin.com\/pulse\/semantic-triples-definition-function-components-benefits-reduan-nqmec\/\">https:\/\/www.linkedin.com\/pulse\/semantic-triples-definition-function-components-benefits-reduan-nqmec\/<\/a>\u00a0(Accessed: 11 February 2026).<\/p>\n<p> (c) SANS Internet Storm Center. https:\/\/isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Unstructured text to interactive knowledge graph via LLM &amp; SPO triplet extraction Courtesy of\u00a0TLDR InfoSec\u00a0Launches &amp; Tools again, another fine discovery in\u00a0Robert McDermott\u2019s\u00a0AI Powered Knowledge Graph Generator. Robert\u2019s system takes unstructured text, uses your preferred LLM and extracts knowledge in the form of Subject-Predicate-Object (SPO) triplets, then visualizes the relationships as an interactive knowledge graph.[1] [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"site-container-style":"default","site-container-layout":"default","site-sidebar-layout":"default","disable-article-header":"default","disable-site-header":"default","disable-site-footer":"default","disable-content-area-spacing":"default","footnotes":""},"categories":[90],"tags":[91],"class_list":["post-1283","post","type-post","status-publish","format-standard","hentry","category-cybersecurity","tag-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>AI-Powered Knowledge Graph Generator &amp; APTs, (Thu, Feb 12th) - Imperative Business Ventures Limited<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/13\/ai-powered-knowledge-graph-generator-apts-thu-feb-12th\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"AI-Powered Knowledge Graph Generator &amp; APTs, (Thu, Feb 12th) - Imperative Business Ventures Limited\" \/>\n<meta property=\"og:description\" content=\"Unstructured text to interactive knowledge graph via LLM &amp; SPO triplet extraction Courtesy of\u00a0TLDR InfoSec\u00a0Launches &amp; Tools again, another fine discovery in\u00a0Robert McDermott\u2019s\u00a0AI Powered Knowledge Graph Generator. Robert\u2019s system takes unstructured text, uses your preferred LLM and extracts knowledge in the form of Subject-Predicate-Object (SPO) triplets, then visualizes the relationships as an interactive knowledge graph.[1] [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/13\/ai-powered-knowledge-graph-generator-apts-thu-feb-12th\/\" \/>\n<meta property=\"og:site_name\" content=\"Imperative Business Ventures Limited\" \/>\n<meta property=\"article:published_time\" content=\"2026-02-13T04:00:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/isc.sans.edu\/diaryimages\/images\/aikg12b(1).png\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/13\/ai-powered-knowledge-graph-generator-apts-thu-feb-12th\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/13\/ai-powered-knowledge-graph-generator-apts-thu-feb-12th\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02\"},\"headline\":\"AI-Powered Knowledge Graph Generator &amp; APTs, (Thu, Feb 12th)\",\"datePublished\":\"2026-02-13T04:00:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/13\/ai-powered-knowledge-graph-generator-apts-thu-feb-12th\/\"},\"wordCount\":1293,\"image\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/13\/ai-powered-knowledge-graph-generator-apts-thu-feb-12th\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/isc.sans.edu\/diaryimages\/images\/aikg12b(1).png\",\"keywords\":[\"Cybersecurity\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/13\/ai-powered-knowledge-graph-generator-apts-thu-feb-12th\/\",\"url\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/13\/ai-powered-knowledge-graph-generator-apts-thu-feb-12th\/\",\"name\":\"AI-Powered Knowledge Graph Generator &amp; APTs, (Thu, Feb 12th) - Imperative Business Ventures Limited\",\"isPartOf\":{\"@id\":\"https:\/\/blog.ibvl.in\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/13\/ai-powered-knowledge-graph-generator-apts-thu-feb-12th\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/13\/ai-powered-knowledge-graph-generator-apts-thu-feb-12th\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/isc.sans.edu\/diaryimages\/images\/aikg12b(1).png\",\"datePublished\":\"2026-02-13T04:00:33+00:00\",\"author\":{\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02\"},\"breadcrumb\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/13\/ai-powered-knowledge-graph-generator-apts-thu-feb-12th\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/13\/ai-powered-knowledge-graph-generator-apts-thu-feb-12th\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/13\/ai-powered-knowledge-graph-generator-apts-thu-feb-12th\/#primaryimage\",\"url\":\"https:\/\/isc.sans.edu\/diaryimages\/images\/aikg12b(1).png\",\"contentUrl\":\"https:\/\/isc.sans.edu\/diaryimages\/images\/aikg12b(1).png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/13\/ai-powered-knowledge-graph-generator-apts-thu-feb-12th\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/blog.ibvl.in\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"AI-Powered Knowledge Graph Generator &amp; APTs, (Thu, Feb 12th)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.ibvl.in\/#website\",\"url\":\"https:\/\/blog.ibvl.in\/\",\"name\":\"Imperative Business Ventures Limited\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.ibvl.in\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\/\/blog.ibvl.in\"],\"url\":\"https:\/\/blog.ibvl.in\/index.php\/author\/admin_hcbs9yw6\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"AI-Powered Knowledge Graph Generator &amp; APTs, (Thu, Feb 12th) - Imperative Business Ventures Limited","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/13\/ai-powered-knowledge-graph-generator-apts-thu-feb-12th\/","og_locale":"en_US","og_type":"article","og_title":"AI-Powered Knowledge Graph Generator &amp; APTs, (Thu, Feb 12th) - Imperative Business Ventures Limited","og_description":"Unstructured text to interactive knowledge graph via LLM &amp; SPO triplet extraction Courtesy of\u00a0TLDR InfoSec\u00a0Launches &amp; Tools again, another fine discovery in\u00a0Robert McDermott\u2019s\u00a0AI Powered Knowledge Graph Generator. Robert\u2019s system takes unstructured text, uses your preferred LLM and extracts knowledge in the form of Subject-Predicate-Object (SPO) triplets, then visualizes the relationships as an interactive knowledge graph.[1] [&hellip;]","og_url":"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/13\/ai-powered-knowledge-graph-generator-apts-thu-feb-12th\/","og_site_name":"Imperative Business Ventures Limited","article_published_time":"2026-02-13T04:00:33+00:00","og_image":[{"url":"https:\/\/isc.sans.edu\/diaryimages\/images\/aikg12b(1).png","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/13\/ai-powered-knowledge-graph-generator-apts-thu-feb-12th\/#article","isPartOf":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/13\/ai-powered-knowledge-graph-generator-apts-thu-feb-12th\/"},"author":{"name":"admin","@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02"},"headline":"AI-Powered Knowledge Graph Generator &amp; APTs, (Thu, Feb 12th)","datePublished":"2026-02-13T04:00:33+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/13\/ai-powered-knowledge-graph-generator-apts-thu-feb-12th\/"},"wordCount":1293,"image":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/13\/ai-powered-knowledge-graph-generator-apts-thu-feb-12th\/#primaryimage"},"thumbnailUrl":"https:\/\/isc.sans.edu\/diaryimages\/images\/aikg12b(1).png","keywords":["Cybersecurity"],"articleSection":["Cybersecurity"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/13\/ai-powered-knowledge-graph-generator-apts-thu-feb-12th\/","url":"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/13\/ai-powered-knowledge-graph-generator-apts-thu-feb-12th\/","name":"AI-Powered Knowledge Graph Generator &amp; APTs, (Thu, Feb 12th) - Imperative Business Ventures Limited","isPartOf":{"@id":"https:\/\/blog.ibvl.in\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/13\/ai-powered-knowledge-graph-generator-apts-thu-feb-12th\/#primaryimage"},"image":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/13\/ai-powered-knowledge-graph-generator-apts-thu-feb-12th\/#primaryimage"},"thumbnailUrl":"https:\/\/isc.sans.edu\/diaryimages\/images\/aikg12b(1).png","datePublished":"2026-02-13T04:00:33+00:00","author":{"@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02"},"breadcrumb":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/13\/ai-powered-knowledge-graph-generator-apts-thu-feb-12th\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.ibvl.in\/index.php\/2026\/02\/13\/ai-powered-knowledge-graph-generator-apts-thu-feb-12th\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/13\/ai-powered-knowledge-graph-generator-apts-thu-feb-12th\/#primaryimage","url":"https:\/\/isc.sans.edu\/diaryimages\/images\/aikg12b(1).png","contentUrl":"https:\/\/isc.sans.edu\/diaryimages\/images\/aikg12b(1).png"},{"@type":"BreadcrumbList","@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/13\/ai-powered-knowledge-graph-generator-apts-thu-feb-12th\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.ibvl.in\/"},{"@type":"ListItem","position":2,"name":"AI-Powered Knowledge Graph Generator &amp; APTs, (Thu, Feb 12th)"}]},{"@type":"WebSite","@id":"https:\/\/blog.ibvl.in\/#website","url":"https:\/\/blog.ibvl.in\/","name":"Imperative Business Ventures Limited","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.ibvl.in\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/blog.ibvl.in"],"url":"https:\/\/blog.ibvl.in\/index.php\/author\/admin_hcbs9yw6\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/posts\/1283","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/comments?post=1283"}],"version-history":[{"count":0,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/posts\/1283\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/media?parent=1283"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/categories?post=1283"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/tags?post=1283"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}