idaholab / atDisco
@DisCo is a graph based datastore designed to minimize reverse engineering efforts.
☆12Updated 4 years ago
Alternatives and similar repositories for atDisco:
Users that are interested in atDisco are comparing it to the libraries listed below
- Structured Threat Intelligence Graph☆89Updated last week
- WiiBin is a framework to determine architecture of an unknown binary and locate opcode sections within the same binary via supervised mac…☆20Updated 7 months ago
- Posture Attribute Collection and Evaluation☆24Updated last year
- ☆19Updated 4 years ago
- Exploit, Malware and Vulnerability Scoring Application☆10Updated last year
- A STIX 2.1 Extension Definition for the Course of Action (COA) object type. The nested property extension allows a COA to share machine-r…☆23Updated last year
- Augmentation to Machine Readable CTI☆27Updated last month
- CITL's static analysis engine for native code artifacts☆20Updated 3 years ago
- Python command-line tool that uses nearest neighbor search methods for malware similarity analysis☆16Updated 6 years ago
- This repository hosts community contributed Kestrel analytics☆16Updated 8 months ago
- Yara rules☆10Updated 5 years ago
- ☆23Updated last week
- FireEye Alert json files to MISP Malware information sharing plattform (Alpha)☆32Updated 7 years ago
- ☆57Updated 3 years ago
- Tools related to work with Attack Flow (https://github.com/center-for-threat-informed-defense/attack-flow)☆44Updated 2 years ago
- A GUI/REST interface to find similarities in large sets (think: binaries). Based on ssdeep.☆19Updated 2 years ago
- OASIS-TAC-TC: OWL representation of the TAC TCs work products are maintained here. - https://github.com/oasis-tcs/tac-ontology☆16Updated 3 years ago
- A repository dedicated to the activity of the CWE-CAPEC ICS/OT Special Interest Group.☆55Updated last year
- CyCAT.org taxonomies☆14Updated 3 years ago
- Python OpenIOC Editor☆17Updated 9 years ago
- Simple Imaging. Tactical Triage. Zero Clicks.☆18Updated 7 years ago
- Detection of malware using dynamic behavior and Windows audit logs☆78Updated 9 years ago
- Open-source Fabric templates for cybersecurity and compliance☆15Updated 2 weeks ago
- AWS EKS Cluster Forensics☆23Updated 3 years ago
- Scans a malware file and lists down the related MBC (Malware Behavior Catalog) details.☆21Updated 2 years ago
- Development of the NIST vulnerability data ontology (Vulntology).☆37Updated 8 months ago
- A curated list of tools for incident response☆19Updated 5 years ago
- Remote / Onsite Security Assessment Jumpkit☆38Updated last year
- ☆28Updated 7 years ago
- DNP3 Cyber-attack datasets☆12Updated 7 years ago