MulVAL: A logic-based, data-driven enterprise network security analyzer - Originally developed at Kansas State University, updated for CyberCAPTOR
☆37May 13, 2024Updated last year
Alternatives and similar repositories for mulval
Users that are interested in mulval are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- this will be used for attack graph engine MulVAL to evaluate risk assessment results for different network topologies.☆12Feb 23, 2016Updated 10 years ago
- MulVAL is an cybersecurity reasoning engine that can be applied on top of multiple contexts (cloud, IoT, enterprise network, etc )☆11Feb 23, 2016Updated 10 years ago
- Attack graph construction and analysis☆37May 18, 2019Updated 6 years ago
- MulVAL interaction rules and their mapping to MITRE ATT&CK Techniques☆13Oct 21, 2024Updated last year
- A logic-based enterprise network security analyzer☆142Jan 28, 2023Updated 3 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- ☆11May 3, 2023Updated 2 years ago
- The original code for SCARA: Scalable Graph Neural Networks with Feature-Oriented Optimization (VLDB 2022) and Scalable Decoupling Graph …☆13Mar 8, 2024Updated 2 years ago
- improve mulval to accommodate some updates and make it more suitable for industrial control network☆12Nov 22, 2022Updated 3 years ago
- A deep packet inspection (DPI) framework for benchmarking the covertness of protocol-obfuscation proxies.☆14Apr 13, 2022Updated 4 years ago
- A Simulated Optimal Intrusion Response Game☆21Apr 3, 2022Updated 4 years ago
- Vulnerability as a service: showcasing CVS-2014-0160, a.k.a. Heartbleed☆15Oct 8, 2019Updated 6 years ago
- feature selection by using random forest.☆12Apr 1, 2017Updated 9 years ago
- My presentation on Cyber Grand Challenge and DEFCON 24 CTF at SHLUG monthly meeting☆13Sep 24, 2016Updated 9 years ago
- CLI tool for testing Office documents with macros using MaliciousMacroBot☆12Dec 3, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Minimalistic WebUI for passiveDNS tool☆18May 6, 2021Updated 4 years ago
- BAG-MulVAL: Auxiliary analyzer of intranet security☆21Oct 13, 2023Updated 2 years ago
- ☆11Jan 22, 2020Updated 6 years ago
- nfsinkhole is a Python library and scripts for setting up a Linux server as a sinkhole (monitor, log/capture, and drop all traffic to a s…☆12Apr 8, 2017Updated 9 years ago
- My logstash plugins. Filter: sig (for security detect -> IOC, sig, New value, Reference, link, frequence, ...). Output: alert created by …☆10Jul 26, 2019Updated 6 years ago
- Integration between SIEMs and TAXII services☆10Mar 2, 2023Updated 3 years ago
- ftp.proxy - FTP Proxy Server☆15Dec 16, 2021Updated 4 years ago
- A project from EECS6414M of Winter 2020 at York University☆11Mar 26, 2020Updated 6 years ago
- Graphical analysis of PDF structure.☆13Jan 9, 2017Updated 9 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- cve-search is a tool to import CVE (Common Vulnerabilities and Exposures) and CPE (Common Platform Enumeration) into a MongoDB to facilit…☆25May 5, 2017Updated 8 years ago
- Network timing evaluation used to detect beacons, works with argus flow as the source☆20May 4, 2016Updated 9 years ago
- A BibTeX collection on Zero-Knowledge Proofs☆16Dec 4, 2018Updated 7 years ago
- Feed for verious malicious IPs such as malware and botnets☆12Jun 20, 2016Updated 9 years ago
- ☆11Jul 19, 2021Updated 4 years ago
- DNP3 Cyber-attack datasets☆16Mar 9, 2017Updated 9 years ago
- A python app to predict Att&ck tactics and techniques from cyber threat reports☆128Nov 15, 2023Updated 2 years ago
- ☆12Apr 26, 2018Updated 7 years ago
- archimate templates for yed☆20Feb 13, 2020Updated 6 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- GSAudit at Symantec, ExeAudit at RIM, RECX Binary Assurance for Windows at Recx etc. - core library now WinBinaryAudit☆23Jul 1, 2015Updated 10 years ago
- Software, firmware and hardware designs for Ubertooth☆19Aug 30, 2015Updated 10 years ago
- ☆14Jul 26, 2019Updated 6 years ago
- Argus is a system and network monitoring application☆14Jan 16, 2020Updated 6 years ago
- 基于SpringCloud的配置中心。支持从自研配置中心拉取配置,并在配置发生变更时同步修改本地环境配置。☆11Jun 28, 2024Updated last year
- Help summarize a PCAP file☆33Dec 27, 2011Updated 14 years ago
- This work shows the viability of automatically generated attack graphs that are used for adversary behavior execution in industrial contr…☆12Jun 3, 2021Updated 4 years ago