Cyber Intelligence Ontology
☆56Mar 17, 2017Updated 8 years ago
Alternatives and similar repositories for cyber-ontology
Users that are interested in cyber-ontology are comparing it to the libraries listed below
Sorting:
- The unified ICAS ontology designed to describe information-security related information☆28Feb 6, 2024Updated 2 years ago
- This repository is for development of the Unified Cyber Ontology.☆105Feb 17, 2026Updated 2 weeks ago
- A vulnerability assessment tool for system models☆13Oct 1, 2021Updated 4 years ago
- ☆10Jan 21, 2019Updated 7 years ago
- Unified Cybersecurity Ontology☆109May 6, 2019Updated 6 years ago
- Enables dynamic translation of structured data between formats☆14Dec 14, 2018Updated 7 years ago
- ☆19Mar 31, 2019Updated 6 years ago
- A modular generator for OWL ontologies.☆14Jul 1, 2016Updated 9 years ago
- Visual tool for SPARQL queries on graphol graphs☆10Oct 3, 2018Updated 7 years ago
- CVE Builder script that generates STIX formatted Exploit Target objects☆18Oct 18, 2016Updated 9 years ago
- SHACL4Protege - SHACL constraint validation plugin for Protégé☆38Mar 1, 2026Updated last week
- PAV - Provenance Authoring and Versioning ontology☆23Sep 19, 2025Updated 5 months ago
- Flexible framework that allows automation to process cyber threat information and update endpoint defense tools.☆20Oct 24, 2018Updated 7 years ago
- The backend for WebProtege☆25Updated this week
- Cyber-investigation Analysis Standard Expression (CASE) Ontology☆72Sep 23, 2025Updated 5 months ago
- Tools and specifications for Semantic Data Dictionaries☆12Nov 12, 2025Updated 3 months ago
- ☆24Sep 28, 2022Updated 3 years ago
- Scripts to process big chunks of data from MISP and do in depth correlations on samples.☆12Jul 2, 2016Updated 9 years ago
- RENet is a deep learning tensorflow2.0 model for classify ATT&CK techniques and tactics for cyber threat intelligence with relevance enha…☆12Jan 11, 2023Updated 3 years ago
- CybOX Tools and Scripts☆44Nov 25, 2013Updated 12 years ago
- CybOX Schemas and Schema Development☆43Jun 1, 2017Updated 8 years ago
- Splunk integration with MISP☆12Apr 14, 2018Updated 7 years ago
- ☆13Jul 16, 2023Updated 2 years ago
- A step-by-step tutorial for publishing data and an ontology as Linked Data on your machine.☆14May 9, 2023Updated 2 years ago
- Python package that adds IntelligentGraph capabilities to RDFLib RDF graph package☆55Jan 8, 2024Updated 2 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆41Jul 29, 2020Updated 5 years ago
- D4 core software (server and sample sensor client)☆43Dec 23, 2023Updated 2 years ago
- Systematic Classification Engine for Advanced Data ANalysis☆22Mar 6, 2017Updated 9 years ago
- ☆14May 30, 2018Updated 7 years ago
- Various modules to implement the DetecTor design from http://detector.kuix.de☆52Oct 5, 2016Updated 9 years ago
- SACTI - Securely aggregate CTI sightings and report them on MISP☆14Oct 24, 2022Updated 3 years ago
- Sighting DB is designed to scale writing and reading a count of attributes, tracking when if was first and last seen☆17Apr 11, 2024Updated last year
- OASIS Cyber Threat Intelligence (CTI) TC Open Repository: Convert STIX 1.2 XML to STIX 2.x JSON☆52Apr 15, 2024Updated last year
- Resources for KGC: languages/tools/evaluation-systems☆15Oct 13, 2020Updated 5 years ago
- Stardog Visual Studio Code Extensions☆17Jul 10, 2025Updated 7 months ago
- A lightweight masterclass on everything you need to know about the core of SHACL!☆44Jan 13, 2025Updated last year
- Convert Wikidata Items to vector embeddings☆37Feb 25, 2026Updated last week
- Repository collecting and automagically processing public threat intelligence reports.☆19May 1, 2020Updated 5 years ago
- CyCAT.org taxonomies☆15May 22, 2021Updated 4 years ago