Open Source Tool - Cybersecurity Graph Database in Neo4j
☆71Sep 8, 2023Updated 2 years ago
Alternatives and similar repositories for GraphKer
Users that are interested in GraphKer are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Neo4j Cybersecurity Demo☆18Mar 16, 2022Updated 4 years ago
- Repository for accompanying materials to Threat Knowledge Graphs.☆18Jul 16, 2025Updated 8 months ago
- MALOnt - an ontology for Malware Threat Intelligence.☆13Jul 8, 2021Updated 4 years ago
- ☆12Jan 16, 2023Updated 3 years ago
- A SSD-based graph processing engine for billion-node graphs☆12Feb 1, 2015Updated 11 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Twitch Streamer Analysis, see Twitchverse https://towardsdatascience.com/twitchverse-a-network-analysis-of-twitch-universe-using-neo4j-gr…☆18Oct 25, 2024Updated last year
- Machine learning on knowledge graphs for context-aware security monitoring (data and model)☆18Mar 11, 2022Updated 4 years ago
- The SEPSES Cyber-KB Engine☆28Nov 27, 2024Updated last year
- [Paper][WWW2025] OntoTune: Ontology-Driven Self-training for Aligning Large Language Models☆25Jul 21, 2025Updated 8 months ago
- Security Control Knowledge Graph☆43Jul 6, 2022Updated 3 years ago
- ☆12Feb 18, 2021Updated 5 years ago
- The repository consists of : Construction of the corpus, Named Entity Recognition , Relationship Extraction , Construction of knowledge g…☆36Dec 5, 2022Updated 3 years ago
- A utility that automatically takes screenshots of coordinates using Google Earth.☆28Jan 5, 2021Updated 5 years ago
- GenAI-STIX2.1-Generator is a tool that leverages Azure OpenAI capabilities to transform threat intelligence reports from unstructured web…☆24Mar 24, 2025Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Security Control Knowledge Graph☆32Apr 24, 2024Updated last year
- bug bounty automation☆14Jul 2, 2021Updated 4 years ago
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆181Mar 23, 2023Updated 3 years ago
- Code for the paper "Knowledge Base Completion for Constructing Problem-Oriented Medical Records" at MLHC 2020☆11Jun 8, 2021Updated 4 years ago
- ☆11Jan 28, 2019Updated 7 years ago
- System Security Checker is a bundle of small shell scripts to assess your computer security.☆16Aug 31, 2019Updated 6 years ago
- Open Source Threat Intelligence Platform☆166Jan 8, 2026Updated 3 months ago
- Amazon CloudFormation Templates (CFT) for Neo4j☆20Mar 9, 2026Updated last month
- version 2 of the Unified Cybersecurity Ontology☆16May 7, 2017Updated 8 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Representation Learning with Ordered Relation Paths for Knowledge Graph Completion (EMNLP 2019)☆11Nov 17, 2019Updated 6 years ago
- Extract machine readable cyber threat intelligence from unstructured data (inc. PDFs, Word docs, and HTML pages)☆36Updated this week
- ☆24Aug 15, 2020Updated 5 years ago
- KRYSTAL: Knowledge Graph-based Framework for Tactical Attack Discovery in Audit Data☆41Apr 25, 2024Updated last year
- Crowdsourced cypher statement evaluation☆32Feb 6, 2024Updated 2 years ago
- PHP synthetic test cases generator☆10Oct 15, 2023Updated 2 years ago
- Severity scoring and exploit categorisation for vulnerability reports using machine-learning tools.☆26May 16, 2023Updated 2 years ago
- ☆16Jan 5, 2017Updated 9 years ago
- TRAM is an open-source platform designed to advance research into automating the mapping of cyber threat intelligence reports to MITRE AT…☆558May 6, 2025Updated 11 months ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Jul 5, 2021Updated 4 years ago
- QA system based on Medical knowledge graph☆15Jun 26, 2019Updated 6 years ago
- ☆21Jan 2, 2026Updated 3 months ago
- JSON schema representation of Stucco ontology☆19Apr 14, 2016Updated 9 years ago
- A curated list of GPT agents for cybersecurity☆12Oct 2, 2024Updated last year
- Demo App that uses GRANDstack to visualize Harry Potter network☆18Sep 19, 2021Updated 4 years ago
- ☆22Sep 19, 2024Updated last year