MulVAL: A logic-based, data-driven enterprise network security analyzer - Originally developed at Kansas State University, updated for CyberCAPTOR
☆37May 13, 2024Updated last year
Alternatives and similar repositories for mulval
Users that are interested in mulval are comparing it to the libraries listed below
Sorting:
- this will be used for attack graph engine MulVAL to evaluate risk assessment results for different network topologies.☆12Feb 23, 2016Updated 10 years ago
- MulVAL is an cybersecurity reasoning engine that can be applied on top of multiple contexts (cloud, IoT, enterprise network, etc )☆11Feb 23, 2016Updated 10 years ago
- Attack graph construction and analysis☆36May 18, 2019Updated 6 years ago
- MulVAL interaction rules and their mapping to MITRE ATT&CK Techniques☆13Oct 21, 2024Updated last year
- A logic-based enterprise network security analyzer☆137Jan 28, 2023Updated 3 years ago
- improve mulval to accommodate some updates and make it more suitable for industrial control network☆12Nov 22, 2022Updated 3 years ago
- The original code for SCARA: Scalable Graph Neural Networks with Feature-Oriented Optimization (VLDB 2022) and Scalable Decoupling Graph …☆13Mar 8, 2024Updated 2 years ago
- ☆11May 3, 2023Updated 2 years ago
- Headway - Selenium Maven TestNG POM Data Driven Framework☆18Jul 2, 2025Updated 8 months ago
- This repository explores a variety of data visualization techniques, with a particular focus on applications in the hospitality domain. I…☆42Oct 16, 2025Updated 4 months ago
- A Simulated Optimal Intrusion Response Game☆21Apr 3, 2022Updated 3 years ago
- A MAL language that demonstrates the Maven project structure☆23Feb 27, 2026Updated last week
- BAG-MulVAL: Auxiliary analyzer of intranet security☆21Oct 13, 2023Updated 2 years ago
- OWASP Threat Dragon with Gitlab Integration☆27Nov 6, 2017Updated 8 years ago
- cve-search is a tool to import CVE (Common Vulnerabilities and Exposures) and CPE (Common Platform Enumeration) into a MongoDB to facilit…☆25May 5, 2017Updated 8 years ago
- A python app to predict Att&ck tactics and techniques from cyber threat reports☆128Nov 15, 2023Updated 2 years ago
- OWASP Threat Dragon core files☆29May 15, 2021Updated 4 years ago
- ☆11Sep 23, 2025Updated 5 months ago
- The official Prewikka GitHub mirror of https://www.prelude-siem.org/projects/prewikka/repository☆10Sep 11, 2020Updated 5 years ago
- A collection of personal ZAP scripts☆13Apr 10, 2023Updated 2 years ago
- Distributed sentiment analysis on GitHub commit comments☆10Jun 9, 2015Updated 10 years ago
- A project from EECS6414M of Winter 2020 at York University☆11Mar 26, 2020Updated 5 years ago
- Obsidian plugin: Automatically organizes files into folders based on their extensions.☆12Dec 3, 2025Updated 3 months ago
- Mission Landing Zone for Edge Technologies☆14Oct 9, 2023Updated 2 years ago
- restaurant pagers from local foodcourt☆11Aug 15, 2022Updated 3 years ago
- Invadium runs exploit playbooks against vulnerable target applications in an intuitive, reproducible, and well-defined manner.☆11Apr 27, 2023Updated 2 years ago
- 一种用于序列标注任务的数据标注(分词,NER)的工具☆11Jun 3, 2020Updated 5 years ago
- Madek main web interface☆21Updated this week
- Ensure that your Johnny Decimal system is neat and clean.☆17Nov 14, 2024Updated last year
- A template for creating new SBTs inheriting from the Masa SBT smart contracts, using ZKP.☆11Nov 25, 2024Updated last year
- zkSnark circuit compiler☆12Feb 19, 2026Updated 2 weeks ago
- A Python framework that uses machine learning algorithms to implement the metadata recovery attack against obfuscated programs.☆11Jul 25, 2016Updated 9 years ago
- A comprehensive framework and assessment toolkit for measuring and improving Cloud Native security maturity across 8 critical business fu…☆10Jun 24, 2025Updated 8 months ago
- The self-organizing second brain. Augmented intelligence for thinkers.☆19Feb 26, 2026Updated last week
- Transform EQL detection rules to VQL artifacts☆12Nov 12, 2021Updated 4 years ago
- OpenDXL Console is a high-level web-based console for interacting with a DXL fabric☆11Mar 29, 2021Updated 4 years ago
- Examples of Docker image build pipelines, including vulnerability scanning with Anchore Engine☆10Mar 6, 2019Updated 7 years ago
- This is a first test for a Plex bulk downloader app. Browse to any album (music, photos or tv series) and click the extention icon and th…☆11Jan 24, 2022Updated 4 years ago
- Correlate NVD datasets wIth CWE/CAPEC/CVSS labels for customised usage. Plus static analysis and data visualisation.☆13Nov 17, 2023Updated 2 years ago