Attack graph construction and analysis
☆37May 18, 2019Updated 6 years ago
Alternatives and similar repositories for attack-graphs
Users that are interested in attack-graphs are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆33Jan 28, 2021Updated 5 years ago
- improve mulval to accommodate some updates and make it more suitable for industrial control network☆12Nov 22, 2022Updated 3 years ago
- MulVAL interaction rules and their mapping to MITRE ATT&CK Techniques☆13Oct 21, 2024Updated last year
- A logic-based enterprise network security analyzer☆142Jan 28, 2023Updated 3 years ago
- MulVAL: A logic-based, data-driven enterprise network security analyzer - Originally developed at Kansas State University, updated for Cy…☆37May 13, 2024Updated last year
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- BAG-MulVAL: Auxiliary analyzer of intranet security☆21Oct 13, 2023Updated 2 years ago
- ☆11May 3, 2023Updated 2 years ago
- this will be used for attack graph engine MulVAL to evaluate risk assessment results for different network topologies.☆12Feb 23, 2016Updated 10 years ago
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆181Mar 23, 2023Updated 3 years ago
- This work shows the viability of automatically generated attack graphs that are used for adversary behavior execution in industrial contr…☆12Jun 3, 2021Updated 4 years ago
- [TDSC 2021] IntruSion alert-driven Attack Graph Extractor. https://ieeexplore.ieee.org/document/9557854☆39Jun 28, 2024Updated last year
- Simple implementation of scientific paper 'GAC: Graph-Based Alert Correlation for the Detection of Distributed Multi-Step Attacks'☆19May 12, 2019Updated 6 years ago
- This is code for finding the minimax/nash/stackelberg strategy of players in Markov Games.☆27Jun 26, 2025Updated 10 months ago
- CP-ABE测试加解密操作和密钥生成操作的性能☆11Jun 24, 2020Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Solves a Mixed Integer Linear Program to generate the Stacklberg Equilibrium of a General-sum (+Bayesian) Games.☆36Jan 9, 2026Updated 3 months ago
- My presentation on Cyber Grand Challenge and DEFCON 24 CTF at SHLUG monthly meeting☆13Sep 24, 2016Updated 9 years ago
- Fast 4 way vectorized ladder for the complete set of Montgomery curves☆11Feb 13, 2019Updated 7 years ago
- 针对大模型的后门攻击☆12Jun 30, 2024Updated last year
- 当崩坏3角色拥有朋友圈,会怎样呢?创意来自:https://www.bilibili.com/video/av27976619☆11Dec 26, 2018Updated 7 years ago
- XSB Prolog☆14Mar 27, 2010Updated 16 years ago
- ftp.proxy - FTP Proxy Server☆15Dec 16, 2021Updated 4 years ago
- 毕设项目,项目名称为轻松买比价网,通过爬虫获取各大电商平台中特定的商品的价格图片等数据,并在本系统中进行比价展示。 系统主要分为3个模块,用户模块,搜索模块,商品模块。☆13Oct 10, 2022Updated 3 years ago
- Stronger and Faster Side-Channel Protections for CSIDH☆21Dec 20, 2020Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A method for grouping, clustering, and merging semi-structured alerts☆24Nov 15, 2024Updated last year
- An Abstract Cyber Security Simulation and Markov Game for OpenAI Gym☆87Feb 23, 2025Updated last year
- A project from EECS6414M of Winter 2020 at York University☆11Mar 26, 2020Updated 6 years ago
- ⚙ Skeleton TiddlyWiki for developing plugins using the ThirdFlow, see: https://thediveo.github.io/TiddlyWikiPluginSkeleton and https://yo…☆10Mar 1, 2020Updated 6 years ago
- 🍒 A massif (Valgrind) extension to analyze partial memory consumptions☆22Dec 6, 2016Updated 9 years ago
- Extract useful semantic from CVE descriptions usinig NLP☆25Jan 4, 2023Updated 3 years ago
- Leo code snippets☆13Apr 27, 2020Updated 6 years ago
- An environment for testing AI pentesting agents against a simulated network.☆206Feb 28, 2024Updated 2 years ago
- ☆46Dec 26, 2021Updated 4 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- CVE-Everyday,每天新增CVE漏洞汇总、统计。☆29Nov 26, 2020Updated 5 years ago
- ☆16Apr 15, 2019Updated 7 years ago
- CDnCNN-B for blind color image denoising - Tensorflow implementation☆10Mar 24, 2023Updated 3 years ago
- Tool to visualize and explain LTL counterexamples generated by the NuSMV model checker☆10Sep 7, 2020Updated 5 years ago
- A small package used to visualize gradient descent of test functions.☆17Aug 1, 2022Updated 3 years ago
- Split a TiddlyWiki into multiple text files, one file per tiddler.☆11Apr 18, 2019Updated 7 years ago
- 基于SpringCloud的配置中心。支持从自研配置中心拉取配置,并在配置发生变更时同步修改本地环境配置。☆11Jun 28, 2024Updated last year