MALOnt - an ontology for Malware Threat Intelligence.
☆13Jul 8, 2021Updated 4 years ago
Alternatives and similar repositories for MALOnt
Users that are interested in MALOnt are comparing it to the libraries listed below
Sorting:
- ☆24Dec 10, 2022Updated 3 years ago
- Information Security Knowledge Graph about NVD CAPEC CWE CPE ..☆66May 12, 2020Updated 5 years ago
- ☆10Jan 21, 2019Updated 7 years ago
- Cyber Security concepts extracted from unstructured threat intelligence reports using Named Entity Recognition☆116May 27, 2023Updated 2 years ago
- ☆24Aug 15, 2020Updated 5 years ago
- Official repository for MalKG☆24Feb 12, 2021Updated 5 years ago
- AnnoCTR corpus for detection and linking of entities in cyber threat reports☆27Apr 12, 2024Updated last year
- Vulnerability knowledge graph construction☆30Dec 24, 2022Updated 3 years ago
- Code for the use cases presented in the paper Symbion: Interleaving Symbolic with Concrete Execution☆15Dec 30, 2021Updated 4 years ago
- Extracting Attack Behavior from Threat Reports☆80Apr 28, 2023Updated 2 years ago
- Open Source Tool - Cybersecurity Graph Database in Neo4j☆70Sep 8, 2023Updated 2 years ago
- This repository contains the data and code created under the project NLP4Rare-cm-uc3m.☆10Sep 14, 2021Updated 4 years ago
- ☆12Oct 5, 2022Updated 3 years ago
- ☆19Jun 27, 2022Updated 3 years ago
- A Knowledge Graph for Open Source Security Tools☆18Aug 15, 2023Updated 2 years ago
- Get all cve corresponding to a specific keyword or a list of keywords from the mitre database (https://cve.mitre.org/)☆17Aug 20, 2022Updated 3 years ago
- PHP synthetic test cases generator☆10Oct 15, 2023Updated 2 years ago
- RouteNet version for the Graph Neural Networking Challenge☆13Jun 30, 2020Updated 5 years ago
- CVE\CWE\CAPEC\ATT&CK, security knowledge graph, knowledge graph completion☆14Jun 9, 2023Updated 2 years ago
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆182Mar 23, 2023Updated 3 years ago
- ☆12Jan 16, 2023Updated 3 years ago
- ☆12Mar 23, 2024Updated last year
- BGNN4VD: Constructing Bidirectional Graph Neural-Network for Vulnerability Detection☆10Oct 2, 2020Updated 5 years ago
- Code repository for EMNLP 2021 paper 'Adversarial Attacks on Knowledge Graph Embeddings via Instance Attribution Methods'☆16Oct 13, 2022Updated 3 years ago
- ☆18Jul 20, 2023Updated 2 years ago
- OpenAI Gym environment for graph search problems such as shortest path.☆11Dec 24, 2019Updated 6 years ago
- security course list☆14Sep 18, 2015Updated 10 years ago
- BNNetSimulator is a packet-level network simulator to generate datasets for research and analysis.☆18Feb 8, 2024Updated 2 years ago
- Machine learning on knowledge graphs for context-aware security monitoring (data and model)☆18Mar 11, 2022Updated 4 years ago
- A virus checker for nim binaries☆22Mar 9, 2026Updated 2 weeks ago
- This is an introduction to Retrieval-Augmented Generation (RAG) for beginners . It uses Llama 2 LLM, FAISS vector store, and LangChain as…☆17Jul 8, 2025Updated 8 months ago
- Few-Shot Relation Extraction with AllenNLP☆12Jan 27, 2019Updated 7 years ago
- Replication package for the paper "Automatic Mapping of Unstructured Cyber Threat Intelligence: An Experimental Study" published at the I…☆57Aug 29, 2022Updated 3 years ago
- Final project for the M.Sc. in Engineering in Computer Science at Università degli Studi di Roma "La Sapienza" (A.Y. 2016/2017).☆35Oct 23, 2017Updated 8 years ago
- ☆14Mar 13, 2023Updated 3 years ago
- Automatic tool using for crawling code to find low-hang fruit vulnerabilities - Based on OWASP Secure Code Review Guide☆21Aug 31, 2020Updated 5 years ago
- [JMIR Medical Informatics] Automatic Rare Disease Knowledge Graph Construction☆14Dec 1, 2023Updated 2 years ago
- Malicious Network Traffic Analysis with AI☆22Feb 1, 2024Updated 2 years ago
- This repo contains the data and codes for the paper submitted to ACM TKDD, titled "A Compact Vulnerability Knowledge Graph for Risk Asses…☆19Mar 8, 2023Updated 3 years ago