CRUSOE: A Toolset for Cyber Situational Awareness and Decision Support in Incident Handling Inspired by the OODA Loop
☆15Dec 11, 2024Updated last year
Alternatives and similar repositories for CRUSOE
Users that are interested in CRUSOE are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Cybersecurity Ontology (CyberOnto) and Situational Awareness (CyberSA) help teamwork in Cyber Incident Responses, Control, Containment, a…☆10Sep 15, 2022Updated 3 years ago
- A C++ software tool for generating and analyzing model bulk heterojunction morphologies in a parallel computing environment☆11Nov 27, 2020Updated 5 years ago
- A Simulated Optimal Intrusion Response Game☆21Apr 3, 2022Updated 4 years ago
- SMET : Semantic Mapping of CVE to ATT&CK and its Application to Cybersecurity☆54Sep 14, 2024Updated last year
- ☆19Jun 6, 2017Updated 8 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- https://github.com/aligungr/UERANSIM☆10Apr 23, 2021Updated 5 years ago
- A benchmark for Geometric Algebra libraries, library generators, and code optimizers.☆23Sep 22, 2021Updated 4 years ago
- Demonstrate the some of features of gRPC☆14Dec 15, 2019Updated 6 years ago
- Security Control Knowledge Graph☆32Apr 24, 2024Updated 2 years ago
- Axon (Spring Boot) demo application - Deploy to Kubernetes via Docker Stack API and/or `kubectl` and `skaffold` - Scale out☆16Sep 8, 2022Updated 3 years ago
- Explore a state machine mechanism/notation for Simpy☆12May 24, 2022Updated 3 years ago
- Correlate NVD datasets wIth CWE/CAPEC/CVSS labels for customised usage. Plus static analysis and data visualisation.☆13Nov 17, 2023Updated 2 years ago
- Research simulation toolkit for federated learning☆13Nov 7, 2020Updated 5 years ago
- The original code for SCARA: Scalable Graph Neural Networks with Feature-Oriented Optimization (VLDB 2022) and Scalable Decoupling Graph …☆13Mar 8, 2024Updated 2 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Small Python-based web application honeypot with built-in analysis tools.☆12Sep 15, 2019Updated 6 years ago
- This work shows the viability of automatically generated attack graphs that are used for adversary behavior execution in industrial contr…☆12Jun 3, 2021Updated 4 years ago
- This is the code repository for the paper "Zero-Sum Stochastic Stackelberg Games".☆17Oct 12, 2022Updated 3 years ago
- Bunch of honey related items that spoof/decoy powersploit functions.☆18Apr 23, 2020Updated 6 years ago
- Defending IaaS with ATT&CK is a project to create a collection of ATT&CK techniques relevant to a Linux IaaS environment, as well as a me …☆14May 28, 2025Updated 11 months ago
- Map MITRE attack to n dimensional embeddings and vise versa☆18May 22, 2025Updated 11 months ago
- TTCP CAGE Challenge 3☆37Apr 1, 2024Updated 2 years ago
- improve mulval to accommodate some updates and make it more suitable for industrial control network☆12Nov 22, 2022Updated 3 years ago
- ☆35Updated this week
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- RASSH – Reinforced Adaptive SSH Honeypot This is a project developed for my Phd Thesis and the target is to create an Adaptive Honeypot…☆12Jul 29, 2019Updated 6 years ago
- This repository contains a series of scripting tools that were created to enable data-driven design to support large-scale scenario pla…☆24Mar 16, 2026Updated last month
- Search for Common Platform Enumeration (CPE) strings using software names and titles.☆25Apr 20, 2026Updated 2 weeks ago
- Repository for code and lab resources for "Neural and Cognitive Models of Adaptive Decision Making" course (2018)☆11Jul 20, 2023Updated 2 years ago
- A Red Team Script to Detect Canary Tokens and Seed Files☆16Jan 2, 2024Updated 2 years ago
- Windows ARM64 build for TeX Live☆15Mar 13, 2025Updated last year
- Point of Concept: To help to automate the collection of evidence for SOC 2 Audits and etc.☆11May 13, 2024Updated last year
- Code for Chain-of-Thought Hijacking☆26Nov 10, 2025Updated 5 months ago
- Rapid Response sample Foundry app☆17Apr 23, 2026Updated last week
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- alternatives to Huawei PC Manager☆19Dec 23, 2024Updated last year
- Evolutionary Based Moving Target Cyber-Defense Master Thesis☆12Jan 21, 2020Updated 6 years ago
- Factored Interactive POMDP solver based on symbolic Perseus.☆11Aug 12, 2025Updated 8 months ago
- this will be used for attack graph engine MulVAL to evaluate risk assessment results for different network topologies.☆12Feb 23, 2016Updated 10 years ago
- ☆10Apr 29, 2024Updated 2 years ago
- Lattice RingCT v2.0 with Multiple Input and Output Wallets☆11Feb 21, 2019Updated 7 years ago
- ☆13Jul 2, 2020Updated 5 years ago