daedafusion / cyber-ontologyView external linksLinks
Cyber Intelligence Ontology
☆56Mar 17, 2017Updated 8 years ago
Alternatives and similar repositories for cyber-ontology
Users that are interested in cyber-ontology are comparing it to the libraries listed below
Sorting:
- The unified ICAS ontology designed to describe information-security related information☆28Feb 6, 2024Updated 2 years ago
- This repository is for development of the Unified Cyber Ontology.☆104Nov 24, 2025Updated 2 months ago
- A vulnerability assessment tool for system models☆13Oct 1, 2021Updated 4 years ago
- ☆10Jan 21, 2019Updated 7 years ago
- Unified Cybersecurity Ontology☆108May 6, 2019Updated 6 years ago
- Enables dynamic translation of structured data between formats☆14Dec 14, 2018Updated 7 years ago
- ☆19Mar 31, 2019Updated 6 years ago
- A modular generator for OWL ontologies.☆14Jul 1, 2016Updated 9 years ago
- Visual tool for SPARQL queries on graphol graphs☆10Oct 3, 2018Updated 7 years ago
- The backend for WebProtege☆22Feb 6, 2026Updated last week
- CVE Builder script that generates STIX formatted Exploit Target objects☆18Oct 18, 2016Updated 9 years ago
- SHACL4Protege - SHACL constraint validation plugin for Protégé☆38Dec 19, 2025Updated last month
- PAV - Provenance Authoring and Versioning ontology☆23Sep 19, 2025Updated 4 months ago
- Flexible framework that allows automation to process cyber threat information and update endpoint defense tools.☆20Oct 24, 2018Updated 7 years ago
- Cyber-investigation Analysis Standard Expression (CASE) Ontology☆72Sep 23, 2025Updated 4 months ago
- Tools and specifications for Semantic Data Dictionaries☆12Nov 12, 2025Updated 3 months ago
- A repository to work on the transmodel ontology that provides support to the NeTEx model☆11Feb 17, 2021Updated 4 years ago
- ☆15Mar 13, 2018Updated 7 years ago
- RENet is a deep learning tensorflow2.0 model for classify ATT&CK techniques and tactics for cyber threat intelligence with relevance enha…☆12Jan 11, 2023Updated 3 years ago
- Scripts to process big chunks of data from MISP and do in depth correlations on samples.☆12Jul 2, 2016Updated 9 years ago
- Maltego Transform to put entities into MISP events☆28Jul 24, 2021Updated 4 years ago
- CybOX Schemas and Schema Development☆43Jun 1, 2017Updated 8 years ago
- Splunk integration with MISP☆12Apr 14, 2018Updated 7 years ago
- ☆13Jul 16, 2023Updated 2 years ago
- Python package that adds IntelligentGraph capabilities to RDFLib RDF graph package☆55Jan 8, 2024Updated 2 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆41Jul 29, 2020Updated 5 years ago
- D4 core software (server and sample sensor client)☆42Dec 23, 2023Updated 2 years ago
- NiFi Dynamic Script Executors☆15Jul 17, 2016Updated 9 years ago
- Various modules to implement the DetecTor design from http://detector.kuix.de☆52Oct 5, 2016Updated 9 years ago
- ☆14May 30, 2018Updated 7 years ago
- Systematic Classification Engine for Advanced Data ANalysis☆22Mar 6, 2017Updated 8 years ago
- SACTI - Securely aggregate CTI sightings and report them on MISP☆14Oct 24, 2022Updated 3 years ago
- Convert Wikidata Items to vector embeddings☆33Oct 1, 2025Updated 4 months ago
- OASIS Cyber Threat Intelligence (CTI) TC Open Repository: Convert STIX 1.2 XML to STIX 2.x JSON☆52Apr 15, 2024Updated last year
- Owlery is a set of REST web services which allow querying of an OWL reasoner containing a configured set of ontologies.☆16Aug 13, 2024Updated last year
- Resources for KGC: languages/tools/evaluation-systems☆15Oct 13, 2020Updated 5 years ago
- Sighting DB is designed to scale writing and reading a count of attributes, tracking when if was first and last seen☆17Apr 11, 2024Updated last year
- Stardog Visual Studio Code Extensions☆17Jul 10, 2025Updated 7 months ago
- A lightweight masterclass on everything you need to know about the core of SHACL!☆44Jan 13, 2025Updated last year