MALOnt - an ontology for Malware Threat Intelligence.
☆13Jul 8, 2021Updated 4 years ago
Alternatives and similar repositories for MALOnt
Users that are interested in MALOnt are comparing it to the libraries listed below
Sorting:
- ☆24Dec 10, 2022Updated 3 years ago
- ☆10Jan 21, 2019Updated 7 years ago
- Information Security Knowledge Graph about NVD CAPEC CWE CPE ..☆66May 12, 2020Updated 5 years ago
- Code for the use cases presented in the paper Symbion: Interleaving Symbolic with Concrete Execution☆15Dec 30, 2021Updated 4 years ago
- Cyber Security concepts extracted from unstructured threat intelligence reports using Named Entity Recognition☆116May 27, 2023Updated 2 years ago
- AnnoCTR corpus for detection and linking of entities in cyber threat reports☆26Apr 12, 2024Updated last year
- A virus checker for nim binaries☆22Jan 10, 2026Updated last month
- Official repository for MalKG☆24Feb 12, 2021Updated 5 years ago
- ☆24Aug 15, 2020Updated 5 years ago
- Vulnerability knowledge graph construction☆30Dec 24, 2022Updated 3 years ago
- A class validation and transformation library, to ensure secure data structures in Python.☆10May 16, 2024Updated last year
- Final project for the M.Sc. in Engineering in Computer Science at Università degli Studi di Roma "La Sapienza" (A.Y. 2016/2017).☆35Oct 23, 2017Updated 8 years ago
- Extracting Attack Behavior from Threat Reports☆81Apr 28, 2023Updated 2 years ago
- ☆11Aug 31, 2019Updated 6 years ago
- Python's dependable dependency injection container for managing lifecycles and registrations.☆14May 16, 2024Updated last year
- ☆12Oct 5, 2022Updated 3 years ago
- 一种用于序列标注任务的数据标注(分词,NER)的工具☆11Jun 3, 2020Updated 5 years ago
- Stochastic Markov Games☆12Oct 5, 2017Updated 8 years ago
- Security diagnostic quick start guide. Identifying the best measures and establishing specific security procedures for your organization.☆11May 29, 2019Updated 6 years ago
- Meta-Reinforcement Learning with Policy Residual Representation☆11Aug 15, 2019Updated 6 years ago
- Wafid allows one to identify and fingerprint Web Application Firewall (WAF) products protecting a website.☆10Oct 19, 2020Updated 5 years ago
- ☆22Nov 22, 2025Updated 3 months ago
- netbeacon - monitoring your network capture, NIDS or network analysis process☆19Oct 26, 2013Updated 12 years ago
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆182Mar 23, 2023Updated 2 years ago
- ☆10Apr 10, 2024Updated last year
- A collection of short scripts for analysis, encryption and forensics, that can be used for CTF and/or security assessments☆10Sep 22, 2015Updated 10 years ago
- Package wifiqr implements support for generating WiFi QR codes. MIT Licensed.☆13Oct 1, 2024Updated last year
- PeopleScrap is used to gather information (OSINT) about people in a company☆11Jan 22, 2019Updated 7 years ago
- security course list☆14Sep 18, 2015Updated 10 years ago
- Decoupled AI copilot for pentesting & CTFs. Sidecar tails your shell history, parses tool outputs, grounds suggestions in your notes, and…☆13Nov 21, 2025Updated 3 months ago
- The PT tracing portion of Barnum.☆11Feb 8, 2019Updated 7 years ago
- Few-Shot Relation Extraction with AllenNLP☆13Jan 27, 2019Updated 7 years ago
- Hypergraph Case-Based Reasoning☆12Jun 14, 2018Updated 7 years ago
- Rats sources☆10Feb 23, 2022Updated 4 years ago
- Edutainment game teaching players concepts around machine learning☆15Feb 18, 2020Updated 6 years ago
- A course in numerical methods with Python for engineers and scientists: currently 5 learning modules, with student assignments.☆10Dec 6, 2017Updated 8 years ago
- Magento Security Scanner☆13Jan 10, 2022Updated 4 years ago
- crawling china stock recommendation from Sina Weibo, create pyecharts for data☆11Jan 26, 2018Updated 8 years ago
- A rule-based stream reasoning engine utilizing sliding windows☆10Jun 3, 2022Updated 3 years ago