A Knowledge Graph for Open Source Security Tools
☆18Aug 15, 2023Updated 2 years ago
Alternatives and similar repositories for SecTKG
Users that are interested in SecTKG are comparing it to the libraries listed below
Sorting:
- ☆24Dec 10, 2022Updated 3 years ago
- ☆12Jan 16, 2023Updated 3 years ago
- Official repository for MalKG☆24Feb 12, 2021Updated 5 years ago
- ☆12Jul 26, 2022Updated 3 years ago
- 面向项目版本差异性的漏洞识别技术研究☆14Mar 29, 2022Updated 3 years ago
- 当人工智能遇上安全系列博客及开源代码分享,希望您喜欢~☆19May 20, 2024Updated last year
- Cyber Security concepts extracted from unstructured threat intelligence reports using Named Entity Recognition☆116May 27, 2023Updated 2 years ago
- AnnoCTR corpus for detection and linking of entities in cyber threat reports☆26Apr 12, 2024Updated last year
- Replication package for the paper "Automatic Mapping of Unstructured Cyber Threat Intelligence: An Experimental Study" published at the I…☆57Aug 29, 2022Updated 3 years ago
- Named entity and triple Dataset to create knowledge graphs for Cybersecurity education☆32Aug 4, 2023Updated 2 years ago
- ☆29Dec 11, 2025Updated 2 months ago
- Information Security Knowledge Graph about NVD CAPEC CWE CPE ..☆66May 12, 2020Updated 5 years ago
- ☆36Jan 27, 2026Updated last month
- CyberAttack Sensing and Information Extraction☆73Dec 26, 2024Updated last year
- The repository consists of : Construction of the corpus, Named Entity Recognition , Relationship Extraction , Construction of knowledge g…☆36Dec 5, 2022Updated 3 years ago
- A tool for managing Save games in EscapeTheBackrooms.☆20Feb 23, 2026Updated last week
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆41Jan 31, 2025Updated last year
- A python plugin integrated into Carla Simulator for emulate cyber-attack over the CAN-Bus (https://carla.org/)☆15Apr 26, 2021Updated 4 years ago
- A block-based programming environment for Arduino.☆16Jan 12, 2026Updated last month
- 互通 Telegram 和 QQ 訊息☆10Feb 3, 2023Updated 3 years ago
- Patatap.com clone☆10Oct 22, 2019Updated 6 years ago
- Wafid allows one to identify and fingerprint Web Application Firewall (WAF) products protecting a website.☆10Oct 19, 2020Updated 5 years ago
- Interact with GPT-3 through speech☆12Dec 12, 2022Updated 3 years ago
- provides a new dataset for NER missions in cyber threat intelligence (CTI) field.☆42Aug 3, 2022Updated 3 years ago
- RTSPhuzz - An RTSP Fuzzer written using the Boofuzz framework☆49May 1, 2023Updated 2 years ago
- Metarget技术交流群分享内容定期存档☆12Oct 22, 2021Updated 4 years ago
- DRSource is an extensible, multi-language static analysis tool designed to detect vulnerabilities in source code. It uses a pluggable arc…☆14Updated this week
- L'application pour bloquer un paquet, snipping, analyser le réseau☆11Dec 23, 2016Updated 9 years ago
- ☆11Dec 17, 2018Updated 7 years ago
- ☆13Mar 1, 2024Updated 2 years ago
- Attack/Defense services for the CyberChallenge.IT 2024 National Competition @ Turin, Italy☆11Jul 18, 2024Updated last year
- ☆10Oct 2, 2017Updated 8 years ago
- 我的演讲 ppt or pdf 归档库☆10Mar 28, 2021Updated 4 years ago
- Continuous functions formalized in Lean4. A students project accompanied by a YouTube video.☆17Jul 10, 2025Updated 7 months ago
- ☆11Nov 14, 2024Updated last year
- 🔒 A Node.js ransomware implementation.☆11Jun 17, 2021Updated 4 years ago
- Extract Procedural Details of the TTP based on the actor mentioned in OSINT reportings☆13Feb 25, 2024Updated 2 years ago
- GeekyWeb is a website from where you can learn different programming languages☆13Apr 1, 2024Updated last year
- scripts to setup servers, as quickly as possible☆10Feb 21, 2026Updated last week