Digital-Innovation-Foundation / CyberOntoLinks
Cybersecurity Ontology (CyberOnto) and Situational Awareness (CyberSA) help teamwork in Cyber Incident Responses, Control, Containment, and Countermeasures (CIRC3). We integrate Artificial Intelligence (AI) and Knowledge Graph (KG) tech. to automate CyberSA capabilities.
☆10Updated 3 years ago
Alternatives and similar repositories for CyberOnto
Users that are interested in CyberOnto are comparing it to the libraries listed below
Sorting:
- YAWNING TITAN is an abstract, graph based cyber-security simulation environment that supports the training of intelligent agents for auto…☆66Updated last year
- Machine learning on knowledge graphs for context-aware security monitoring (data and model)☆18Updated 3 years ago
- A compiler for the Meta Attack Language☆15Updated 3 years ago
- 🤖 A GitHub action that leverages fabric patterns through an agent-based approach☆34Updated last year
- This project will work towards a fully-functional autonomous intelligent cyberdefense agent with increasingly advanced capabilities that …☆41Updated last year
- This repository hosts community contributed Kestrel analytics☆18Updated last year
- The repository consists of : Construction of the corpus, Named Entity Recognition , Relationship Extraction , Construction of knowledge g…☆36Updated 3 years ago
- Threat Feeds, Threat lists, and regular lists of known IP ranges and domains. It updates every 4 hours.☆16Updated 4 years ago
- SMET : Semantic Mapping of CVE to ATT&CK and its Application to Cybersecurity☆52Updated last year
- A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports☆28Updated 2 years ago
- CyberBench: A Multi-Task Cyber LLM Benchmark☆30Updated 9 months ago
- Generate JSON force-directed/ node graph data from MITRE's ATTACK framework and visualize it interactively☆38Updated 9 months ago
- ATLAS tactics, techniques, and case studies data☆99Updated last week
- SecureBERT is a domain-specific language model to represent cybersecurity textual data.☆110Updated last year
- Short deep dive into Threat Hunting on AWS☆17Updated 2 years ago
- ChatCVE is an app using the Langchain SQL Language Tool to give a LLM prompt experience to CVE and SBOM DevSecOps Triage Data☆22Updated last month
- A collection of prompt injection mitigation techniques.☆27Updated 2 years ago
- Graphs in Cybersecurity - Bloodhound☆19Updated last year
- ☆81Updated 3 months ago
- A collection of dashboards, templates, API's and Power BI code for vulnerability management and analysis☆24Updated last year
- Security Control Knowledge Graph☆31Updated last year
- Open Source Tool - Cybersecurity Graph Database in Neo4j☆66Updated 2 years ago
- STIX 2.1 Visualizer, Attack and Activity Thread Graph for Threat Modeling☆33Updated last year
- Extracting Attack Behavior from Threat Reports☆81Updated 2 years ago
- Data for CyberSOCEval, an LLM benchmark by Meta & CrowdStrike☆18Updated 4 months ago
- Detection of malicious domain names using machine learning and deep learning models☆16Updated 7 years ago
- Import Mitre Att&ck into Neo4j database☆39Updated 3 years ago
- Scripts and outputs for ATLAS data in STIX JSON and ATT&CK Navigator layer formats☆22Updated this week
- All about llm-agents security,attack,vulnerabilities and how to do them for cybersecurity.☆40Updated last month
- GridAttackAnalyzer: Smart Grid Attack Analysis Framework☆21Updated 3 years ago