MekAkUActOR / BAG_MulVAL
BAG-MulVAL: Auxiliary analyzer of intranet security
☆21Updated last year
Alternatives and similar repositories for BAG_MulVAL:
Users that are interested in BAG_MulVAL are comparing it to the libraries listed below
- Cyber attack toolchain integrating MulVAL☆9Updated 2 years ago
- MulVAL interaction rules and their mapping to MITRE ATT&CK Techniques☆8Updated 2 months ago
- A logic-based enterprise network security analyzer☆112Updated last year
- [TDSC 2021] IntruSion alert-driven Attack Graph Extractor. https://ieeexplore.ieee.org/document/9557854☆32Updated 6 months ago
- Attack graph construction and analysis☆34Updated 5 years ago
- this will be used for attack graph engine MulVAL to evaluate risk assessment results for different network topologies.☆12Updated 8 years ago
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆145Updated last year
- 利用知识图谱分析网络安全事件☆40Updated 4 years ago
- 使用pyspider爬虫框架爬取工控相关数据(漏洞、预警、安全事件等)☆71Updated 4 years ago
- ☆30Updated 3 years ago
- This work shows the viability of automatically generated attack graphs that are used for adversary behavior execution in industrial contr…☆12Updated 3 years ago
- Information Security Knowledge Graph about NVD CAPEC CWE CPE ..☆58Updated 4 years ago
- An adaptive honeypot using a reinforcement learning implementation, to learn from interactions from automated malware attacks☆21Updated 5 years ago
- ☆82Updated 4 years ago
- This resource mainly counts papers related to APT attacks, including APT traceability, APT knowledge graph construction, APT malicious sa…☆205Updated 8 months ago
- Using nmap NSE scripts for identifying common ICS protocols[使用nmap的nse脚本对常见工控协议进行识别,附对应nse脚本,并记录pcap流量]☆150Updated 4 years ago
- 基于深度学习对dga恶意域名检测研究☆53Updated 2 years ago
- ☆13Updated 5 years ago
- ATLAS: A Sequence-based Learning Approach for Attack Investigation☆146Updated 2 years ago
- Ai与Web安全相关资料的总结库,包括认为写的比较好的一些博客、项目、数据等☆77Updated 2 years ago
- Digital Bond's IDS/IPS rules for ICS and ICS protocols.☆142Updated 4 years ago
- 阿里云安全恶意程序检测比赛☆113Updated 4 years ago
- 该资源是各种溯源图相关的论文和资源总结(含PPT),涉及APT攻击检测、入侵检测、流量日志检测、系统安全等领域,希望对大家有所帮助~☆150Updated last year
- 工控CTF比赛工具,各种网络数据包处理脚本☆114Updated 6 years ago
- Material from the DARPA Transparent Computing Program☆185Updated 4 years ago
- MulVAL: A logic-based, data-driven enterprise network security analyzer - Originally developed at Kansas State University, updated for Cy…☆32Updated 8 months ago
- ☆74Updated last year
- ICS Common Protocol Simulator工控常见协议模拟工具集☆54Updated 4 years ago
- Extracting Attack Behavior from Threat Reports☆76Updated last year
- ☆30Updated 6 months ago