This repository holds the necessary content to produce the D3FEND ontology distribution.
☆101Mar 24, 2026Updated this week
Alternatives and similar repositories for d3fend-ontology
Users that are interested in d3fend-ontology are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Public static website for the D3FEND project. For the D3FEND ontology repo see: https://github.com/d3fend/d3fend-ontology☆90Dec 16, 2025Updated 3 months ago
- OASIS TC Open Repository: A GitHub public repository for development of a python library to transform between data-interchange formats (s…☆14Feb 10, 2022Updated 4 years ago
- ☆12Dec 7, 2022Updated 3 years ago
- Zeek support for Community ID flow hashing.☆36Jul 11, 2023Updated 2 years ago
- STIX data representing MITRE ATT&CK☆548Dec 23, 2025Updated 3 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Zeek OPCUA Binary Parser - CISA ICSNPP☆21Mar 3, 2026Updated 3 weeks ago
- CRUSOE: A Toolset for Cyber Situational Awareness and Decision Support in Incident Handling Inspired by the OODA Loop☆15Dec 11, 2024Updated last year
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout for…☆39Aug 18, 2022Updated 3 years ago
- Artifacts of the USENIX Security 2022 paper "Spoki: Unveiling a New Wave of Scanners through a Reactive Network Telescope"☆18Dec 8, 2024Updated last year
- The MITRE ATT&CK Mapping Datasets☆20Jan 23, 2024Updated 2 years ago
- OCSF Schema Validation☆12Dec 13, 2024Updated last year
- OSSEM Data Dictionaries☆65Jan 22, 2025Updated last year
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆79Aug 22, 2023Updated 2 years ago
- A python module for working with ATT&CK☆677Mar 2, 2026Updated 3 weeks ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Automate Checkmarx Scanning and Onboarding Plus AWS Access☆12Jan 5, 2023Updated 3 years ago
- Mapping Corelight or Zeek data to Elastic Common Schema logs☆12Mar 16, 2026Updated last week
- Documentation site for Velociraptor☆70Mar 21, 2026Updated last week
- Log aggregation, analysis, alerting and correlation for Windows, Syslog and text based logs.☆24Oct 1, 2016Updated 9 years ago
- Generates a detailed CSV file containing Sigma Rules statistics for each service or category, and each level, offering a holistic view of…☆10Dec 22, 2023Updated 2 years ago
- Presentation Slides and Resources☆16Jun 12, 2024Updated last year
- Cyber Threat Intelligence Repository expressed in STIX 2.0☆2,044Dec 19, 2025Updated 3 months ago
- ☆14Jun 1, 2023Updated 2 years ago
- Scripts for AWS amusement...☆21May 3, 2022Updated 3 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- A pure Go library for working with Structured Threat Information Expression (STIX™) version 2.x data☆27Apr 27, 2025Updated 11 months ago
- Man-in-the-middle made easy!☆15Mar 25, 2020Updated 6 years ago
- ☆16Apr 30, 2023Updated 2 years ago
- ☆15Oct 21, 2023Updated 2 years ago
- Cloud security documents and tools to assist with conducting risk assessments that conform to the ICS62443 guidelines☆11Mar 20, 2026Updated last week
- Open Source Security Events Metadata (OSSEM)☆1,290Feb 27, 2023Updated 3 years ago
- Unified Cybersecurity Ontology☆109May 6, 2019Updated 6 years ago
- Repository containing Jupyter Notebooks for working with OSQuery tables and data☆17May 8, 2020Updated 5 years ago
- Security Control Knowledge Graph☆32Apr 24, 2024Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Passive ICS Network Scanner based on MAC Address Detection☆21Oct 26, 2020Updated 5 years ago
- LOL's collections☆24Oct 4, 2020Updated 5 years ago
- The open source version of the AWS Security Hub documentation. To provide feedback or request changes, you can submit a pull request that…☆35Jun 16, 2023Updated 2 years ago
- Scripts and a (future) library to improve users' interactions with the ATT&CK content☆593Dec 11, 2023Updated 2 years ago
- Postings for DEF CON 24☆23Aug 22, 2016Updated 9 years ago
- Slides from my PhD thesis defense at MIT CSAIL, October 2018☆10Mar 4, 2019Updated 7 years ago
- GNN MARL Approach for the CAGE-4 automated cyber defense challenge☆15Nov 18, 2025Updated 4 months ago