Ebiquity / Unified-Cybersecurity-OntologyView external linksLinks
Unified Cybersecurity Ontology
☆108May 6, 2019Updated 6 years ago
Alternatives and similar repositories for Unified-Cybersecurity-Ontology
Users that are interested in Unified-Cybersecurity-Ontology are comparing it to the libraries listed below
Sorting:
- version 2 of the Unified Cybersecurity Ontology☆16May 7, 2017Updated 8 years ago
- The SEPSES Cyber-KB Engine☆26Nov 27, 2024Updated last year
- This repository is for development of the Unified Cyber Ontology.☆104Nov 24, 2025Updated 2 months ago
- Cyber Intelligence Ontology☆56Mar 17, 2017Updated 8 years ago
- Information Security Knowledge Graph about NVD CAPEC CWE CPE ..☆66May 12, 2020Updated 5 years ago
- Official repository for MalKG☆24Feb 12, 2021Updated 5 years ago
- Cyber-investigation Analysis Standard Expression (CASE) Ontology☆72Sep 23, 2025Updated 4 months ago
- ☆90Jan 4, 2023Updated 3 years ago
- A Knowledge Graph for Open Source Security Tools☆18Aug 15, 2023Updated 2 years ago
- Corpus of auto-labeled text for the cyber security domain☆97Nov 27, 2019Updated 6 years ago
- ☆14Mar 2, 2021Updated 4 years ago
- JSON schema representation of Stucco ontology☆19Apr 14, 2016Updated 9 years ago
- The repository implement the LMTracker model based on paper: LMTracker: Lateral movement path detection based on heterogeneous graph embe…☆17Jul 12, 2023Updated 2 years ago
- A Semantic LOG ExtRaction Templating (SLOGERT) Approach☆20Nov 27, 2024Updated last year
- Cyber Threat Intelligence Repository expressed in STIX 2.0☆2,027Dec 19, 2025Updated last month
- Loads STIX-2 into Neo4j☆25Jul 11, 2020Updated 5 years ago
- Documentation and Issue Tracking for Stucco☆20Mar 7, 2017Updated 8 years ago
- CTI database generator and public dataset☆21Jan 12, 2020Updated 6 years ago
- ☆86Mar 29, 2023Updated 2 years ago
- ☆10Dec 2, 2022Updated 3 years ago
- 利用知识图谱分析网络安全事件☆42Mar 30, 2020Updated 5 years ago
- A framework for synthesizing lateral movement login data.☆27May 20, 2021Updated 4 years ago
- This repository holds the necessary content to produce the D3FEND ontology distribution.☆98Updated this week
- TTPDrill focuses on developing automated and context-aware analytics of cyber threat intelligence to accurately learn attack patterns (TT…☆28May 29, 2020Updated 5 years ago
- ATT&CK Data Model (ADM): A TypeScript library for structured interaction with MITRE ATT&CK datasets. Uses Zod schemas, TypeScript types, …☆66Updated this week
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Apr 18, 2020Updated 5 years ago
- ☆14Jul 26, 2019Updated 6 years ago
- Resources to parse into computational semantics in order to enable model checkers to regenerate and extend a program resembling the origi…☆13Sep 2, 2024Updated last year
- Material from the DARPA Transparent Computing Program☆227Apr 29, 2020Updated 5 years ago
- CARET - A tool for viewing cyber analytic relationships☆56Jan 15, 2020Updated 6 years ago
- Notes and reference for ongoing forecasting.☆16Mar 24, 2022Updated 3 years ago
- Public Arena dataset☆14Jul 20, 2022Updated 3 years ago
- Open Source Threat Intelligence Desktop Assistant. 划词情报查询助手☆18Aug 10, 2023Updated 2 years ago
- Corelight-Ansible-Roles are a collection of Ansible Roles and playbooks that install, configure, run and manage a variety of Corelight, S…☆16Jun 15, 2021Updated 4 years ago
- A best practice Docker image of Open edX☆19May 14, 2024Updated last year
- ☆102Nov 26, 2020Updated 5 years ago
- A TUI for Managing and Searching with Meilisearch