Attack graph construction and analysis
☆37May 18, 2019Updated 6 years ago
Alternatives and similar repositories for attack-graphs
Users that are interested in attack-graphs are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆33Jan 28, 2021Updated 5 years ago
- ☆14Jul 26, 2019Updated 6 years ago
- improve mulval to accommodate some updates and make it more suitable for industrial control network☆12Nov 22, 2022Updated 3 years ago
- A logic-based enterprise network security analyzer☆141Jan 28, 2023Updated 3 years ago
- MulVAL: A logic-based, data-driven enterprise network security analyzer - Originally developed at Kansas State University, updated for Cy…☆37May 13, 2024Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- BAG-MulVAL: Auxiliary analyzer of intranet security☆21Oct 13, 2023Updated 2 years ago
- ☆11May 3, 2023Updated 2 years ago
- this will be used for attack graph engine MulVAL to evaluate risk assessment results for different network topologies.☆12Feb 23, 2016Updated 10 years ago
- The original code for SCARA: Scalable Graph Neural Networks with Feature-Oriented Optimization (VLDB 2022) and Scalable Decoupling Graph …☆13Mar 8, 2024Updated 2 years ago
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆181Mar 23, 2023Updated 3 years ago
- collect☆18Mar 29, 2020Updated 6 years ago
- [TDSC 2021] IntruSion alert-driven Attack Graph Extractor. https://ieeexplore.ieee.org/document/9557854☆39Jun 28, 2024Updated last year
- A test library for computing modular exponentiation in parallel using AVX-512 vector arithmetic☆12Dec 18, 2023Updated 2 years ago
- Simple implementation of scientific paper 'GAC: Graph-Based Alert Correlation for the Detection of Distributed Multi-Step Attacks'☆19May 12, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- This is code for finding the minimax/nash/stackelberg strategy of players in Markov Games.☆28Jun 26, 2025Updated 9 months ago
- CP-ABE测试加解密操作和密钥生成操作的性能☆11Jun 24, 2020Updated 5 years ago
- Testing AVX capabilities with GCC☆11Jan 24, 2016Updated 10 years ago
- Solves a Mixed Integer Linear Program to generate the Stacklberg Equilibrium of a General-sum (+Bayesian) Games.☆36Jan 9, 2026Updated 3 months ago
- My presentation on Cyber Grand Challenge and DEFCON 24 CTF at SHLUG monthly meeting☆13Sep 24, 2016Updated 9 years ago
- Fast 4 way vectorized ladder for the complete set of Montgomery curves☆11Feb 13, 2019Updated 7 years ago
- Generate network packets using generative modeling☆15May 17, 2023Updated 2 years ago
- 针对大模型的后门攻击☆12Jun 30, 2024Updated last year
- [ICCV 2025] "Player-Centric Multimodal Prompt Generation for Large Language Model Based Identity-Aware Basketball Video Captioning".☆20Dec 11, 2025Updated 4 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆15Dec 7, 2025Updated 4 months ago
- 网络爬虫(又称为网页蜘蛛,网络机器人,在FOAF社区中间,更经常的称为网页追逐者),是一种按照一定的规则,自动地抓取万维网信息的程序或者脚本。另外一些不常使用的名字还有蚂蚁、自动索引、模拟程序或者蠕虫。☆10Aug 2, 2023Updated 2 years ago
- ftp.proxy - FTP Proxy Server☆15Dec 16, 2021Updated 4 years ago
- 毕设项目,项目名称为轻松买比价网,通过爬虫获取各大电商平台中特定的商品的价格图片等数据,并在本系统中进行比价展示。 系统主要分为3个模块,用户模块,搜索模块,商品模块。☆13Oct 10, 2022Updated 3 years ago
- A method for grouping, clustering, and merging semi-structured alerts☆24Nov 15, 2024Updated last year
- ⚙ Skeleton TiddlyWiki for developing plugins using the ThirdFlow, see: https://thediveo.github.io/TiddlyWikiPluginSkeleton and https://yo…☆10Mar 1, 2020Updated 6 years ago
- 🍒 A massif (Valgrind) extension to analyze partial memory consumptions☆22Dec 6, 2016Updated 9 years ago
- Botnet is a form of malware that attacks computers on the internet and controls them with command and control servers to perform a wide v…☆11May 12, 2020Updated 5 years ago
- Correlate NVD datasets wIth CWE/CAPEC/CVSS labels for customised usage. Plus static analysis and data visualisation.☆13Nov 17, 2023Updated 2 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Extract useful semantic from CVE descriptions usinig NLP☆25Jan 4, 2023Updated 3 years ago
- Leo code snippets☆13Apr 27, 2020Updated 5 years ago
- An environment for testing AI pentesting agents against a simulated network.☆206Feb 28, 2024Updated 2 years ago
- ☆45Dec 26, 2021Updated 4 years ago
- Usage examples for Viz.js☆12Dec 8, 2018Updated 7 years ago
- Source code for the following paper(arXiv link): Improved Actor Relation Graph based Group Activity Recognition Zijian Kuang, Xinran Tie☆15Jan 19, 2022Updated 4 years ago
- ☆16Apr 15, 2019Updated 6 years ago