Open Source Tool - Cybersecurity Graph Database in Neo4j
☆72Sep 8, 2023Updated 2 years ago
Alternatives and similar repositories for GraphKer
Users that are interested in GraphKer are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Import Mitre Att&ck into Neo4j database☆41Mar 5, 2026Updated 2 months ago
- MALOnt - an ontology for Malware Threat Intelligence.☆13Jul 8, 2021Updated 4 years ago
- Repository for accompanying materials to Threat Knowledge Graphs.☆21Jul 16, 2025Updated 10 months ago
- Neo4j Cybersecurity Demo☆19Mar 16, 2022Updated 4 years ago
- CVE\CWE\CAPEC\ATT&CK, security knowledge graph, knowledge graph completion☆14Jun 9, 2023Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆12Jan 16, 2023Updated 3 years ago
- Information Security Knowledge Graph about NVD CAPEC CWE CPE ..☆67May 12, 2020Updated 6 years ago
- Twitch Streamer Analysis, see Twitchverse https://towardsdatascience.com/twitchverse-a-network-analysis-of-twitch-universe-using-neo4j-gr…☆18Oct 25, 2024Updated last year
- This repo contains the data and codes for the paper submitted to ACM TKDD, titled "A Compact Vulnerability Knowledge Graph for Risk Asses…☆19Mar 8, 2023Updated 3 years ago
- Machine learning on knowledge graphs for context-aware security monitoring (data and model)☆18Mar 11, 2022Updated 4 years ago
- The SEPSES Cyber-KB Engine☆28Nov 27, 2024Updated last year
- Keras implementation of path-based link prediction model for knowledge graph completion☆24Aug 29, 2022Updated 3 years ago
- ☆12Feb 18, 2021Updated 5 years ago
- [Paper][WWW2025] OntoTune: Ontology-Driven Self-training for Aligning Large Language Models☆26Jul 21, 2025Updated 10 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- The repository consists of : Construction of the corpus, Named Entity Recognition , Relationship Extraction , Construction of knowledge g…☆38Dec 5, 2022Updated 3 years ago
- Security Control Knowledge Graph☆32Apr 24, 2024Updated 2 years ago
- Cybersecurity demo for Neo4j's Connections: Graphs in Cybersecurity 2021☆14May 17, 2022Updated 4 years ago
- bug bounty automation☆14Jul 2, 2021Updated 4 years ago
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆181Mar 23, 2023Updated 3 years ago
- Open Source Threat Intelligence Platform☆167Jan 8, 2026Updated 4 months ago
- Extract machine readable cyber threat intelligence from unstructured data (inc. PDFs, Word docs, and HTML pages)☆39Updated this week
- Kestrel Jupyter Notebook Kernel☆10Oct 19, 2023Updated 2 years ago
- Turn any blog into structured threat intelligence.☆58May 14, 2026Updated last week
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- KG☆14Nov 26, 2022Updated 3 years ago
- KRYSTAL: Knowledge Graph-based Framework for Tactical Attack Discovery in Audit Data☆42Apr 25, 2024Updated 2 years ago
- Reinforcement learning (RL) is an effective method to find reasoning pathways in incomplete knowledge graphs (KGs). To overcome the chall…☆26Oct 13, 2024Updated last year
- ORION is a tool that ingests datasets from diverse knowledge bases and transforms them into modular, interoperable knowledge graphs.☆17May 12, 2026Updated last week
- PHP synthetic test cases generator☆10Oct 15, 2023Updated 2 years ago
- Generate MITRE ATT&CK and D3FEND from a list of CVEs. Database with CVE, CWE, CAPEC, MITRE ATT&CK and D3FEND Techniques data is updated d…☆293May 15, 2026Updated last week
- ☆16Jan 5, 2017Updated 9 years ago
- TRAM is an open-source platform designed to advance research into automating the mapping of cyber threat intelligence reports to MITRE AT…☆564May 6, 2025Updated last year
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Jul 5, 2021Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆21Jan 2, 2026Updated 4 months ago
- JSON schema representation of Stucco ontology☆19Apr 14, 2016Updated 10 years ago
- ☆22Sep 19, 2024Updated last year
- ☆11Oct 13, 2020Updated 5 years ago
- 🪐 A Database of Existing Security Vulnerabilities Patches to Enable Evaluation of Techniques (single-commit; multi-language)☆44Apr 14, 2025Updated last year
- MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.☆67Apr 1, 2024Updated 2 years ago
- Corelight-Ansible-Roles are a collection of Ansible Roles and playbooks that install, configure, run and manage a variety of Corelight, S…☆16Jun 15, 2021Updated 4 years ago