☆14Apr 18, 2025Updated 11 months ago
Alternatives and similar repositories for data_mapper_model
Users that are interested in data_mapper_model are comparing it to the libraries listed below
Sorting:
- Jailer is an eBPF-based process jailing system that provides mandatory access control (MAC) for Linux. It tracks processes using BPF task…☆44Updated this week
- Code samples showing how to include data stored in Backblaze B2 in a RAG application☆11Sep 18, 2024Updated last year
- ☆14Jul 9, 2024Updated last year
- A CALDERA plugin for ATT&CK Evaluations Round 1☆33Sep 14, 2023Updated 2 years ago
- The Purpose of this research tool is to provide a Python client into RiskIQ API services.☆22Feb 4, 2021Updated 5 years ago
- This application simplifies achieving NIST SP 800-171 Revision 2 and 3 compliance by providing a user-friendly interface to manage securi…☆33Mar 11, 2026Updated last week
- Web Server Vulnerability Scanning Tool☆36Mar 11, 2025Updated last year
- AI Engineer Workshop - DSPy is All You Need☆70Jan 13, 2026Updated 2 months ago
- OWASP Foundation web repository☆58Updated this week
- AT-AT (Attack Tree Analysis Tool) is a application that allows users to develop and analyze attack trees. The overall goal is to automati…☆29Aug 17, 2022Updated 3 years ago
- A comprehensive PowerShell-based threat hunting and incident response framework for Windows environments, built around Sysmon event analy…☆48Jul 17, 2025Updated 8 months ago
- NOVA: The Prompt Pattern Matching☆111Jan 27, 2026Updated last month
- Interactive PowerShell framework for testing WMI, COM, LOLBAS, and persistence techniques☆97Dec 28, 2025Updated 2 months ago
- ReARM - Release-Level Supply Chain Evidence Platform. SBOMs, xBOMs and every other artifact - stored for 10+ years, versioned and audit-r…☆102Updated this week
- ☆53Oct 27, 2024Updated last year
- Nuclei plugins to audit Chrome extensions☆65Jul 16, 2024Updated last year
- Automated vulnerability discovery and annotation☆68Jul 26, 2024Updated last year
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆105Oct 13, 2025Updated 5 months ago
- NIST CSF Maturity Toolkit☆116Jun 6, 2025Updated 9 months ago
- An open source platform to support analysts to organise their case and tasks☆127Mar 12, 2026Updated last week
- Cloud Offensive Breach and Risk Assessment (COBRA) Tool☆102Jan 27, 2026Updated last month
- A comprehensive ETW (Event Tracing for Windows) event generation tool designed for testing and research purposes.☆263Sep 23, 2025Updated 5 months ago
- Protection of natural persons with regard to the processing of personal data and on the free movement of such data.☆248Dec 29, 2025Updated 2 months ago
- PcapMonkey will provide an easy way to analyze pcap using the latest version of Suricata and Zeek.☆165Mar 27, 2025Updated 11 months ago
- The principal objective of this project is to develop a knowledge base of the tactics, techniques, and procedures (TTPs) used by insiders…☆150Jul 9, 2025Updated 8 months ago
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆181Dec 11, 2025Updated 3 months ago
- Python-based utility that uses supervised machine learning to detect phishing domains from the Certificate Transparency log network.☆327Sep 11, 2024Updated last year
- gpoParser is a tool designed to extract and analyze configurations applied through Group Policy Objects (GPOs) in an Active Directory env…☆335Mar 11, 2026Updated last week
- Save toil in security operations with: Detection & Intelligence Analysis for New Alerts (D.I.A.N.A. )☆223Sep 4, 2024Updated last year
- ⚡️ Catalyst is a self-hosted, open source incident response platform and ticket system that helps to automate alert handling and incident…☆519Mar 1, 2026Updated 2 weeks ago
- AI-driven Threat modeling-as-a-Code (TaaC-AI)☆161Jun 29, 2025Updated 8 months ago
- A command and control framework written in rust.☆386Sep 4, 2025Updated 6 months ago
- Threat Hunting tool about Sysmon and graphs☆337May 28, 2023Updated 2 years ago
- The TTPForge is a Cybersecurity Framework for developing, automating, and executing attacker Tactics, Techniques, and Procedures (TTPs).☆414Updated this week
- blint is a Binary Linter that checks the security properties and capabilities of your executables. It can also generate a Software Bill-o…☆437Mar 9, 2026Updated last week
- threatspec - continuous threat modeling, through code☆383Dec 30, 2020Updated 5 years ago
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆409Updated this week
- A repository of curated datasets from various attacks☆746Updated this week
- SOCFortress CoPilot☆442Updated this week