idaholab / atDisco
@DisCo is a graph based datastore designed to minimize reverse engineering efforts.
☆12Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for atDisco
- Structured Threat Intelligence Graph☆87Updated 2 weeks ago
- ☆19Updated 4 years ago
- OASIS Cyber Threat Intelligence (CTI) TC: A tool for generating STIX content for prototyping and testing. https://github.com/oasis-open/c…☆40Updated 6 months ago
- Exploit, Malware and Vulnerability Scoring Application☆11Updated last year
- Augmentation to Machine Readable CTI☆25Updated last month
- A repository dedicated to the activity of the CWE-CAPEC ICS/OT Special Interest Group.☆51Updated last year
- Get started using Synapse Open-Source to start a Cortex and perform analysis within your area of expertise.☆38Updated 2 years ago
- A STIX 2.1 Extension Definition for the Course of Action (COA) object type. The nested property extension allows a COA to share machine-r…☆21Updated 11 months ago
- Assemblyline 4 Malware detonation service (Cuckoo)☆18Updated 9 months ago
- Presentation Slides and Resources☆15Updated 5 months ago
- Posture Attribute Collection and Evaluation☆23Updated last year
- Cloud security documents and tools to assist with conducting risk assessments that conform to the ICS62443 guidelines☆10Updated last year
- DNP3 Cyber-attack datasets☆12Updated 7 years ago
- Converting data from services like Censys and Shodan to a common data model☆48Updated 2 months ago
- OASIS CACAO TC: Official repository for work of the CACAO TC https://github.com/oasis-tcs/cacao☆28Updated 9 months ago
- ☆57Updated 3 years ago
- This is the ICSSIM source code and user manual for simulating industrial control system testbed for cybersecurity experiments☆62Updated 4 months ago
- ☆21Updated 2 years ago
- ATLAS tactics, techniques, and case studies data☆49Updated last month
- VINCE is the Vulnerability Information and Coordination Environment developed and used by the CERT Coordination Center to improve coordin…☆59Updated 2 weeks ago
- STIX 2.1 Visualizer, Attack and Activity Thread Graph for Threat Modeling☆32Updated last year
- ☆24Updated last year
- Remote / Onsite Security Assessment Jumpkit☆38Updated last year
- ☆27Updated 3 years ago
- A set of PCAPs used to test the parsers used by Malcolm. Also, a curated list of PCAP collections I've found online.☆32Updated 3 weeks ago
- An elevated STIX representation of the MITRE ATT&CK Groups knowledge base☆23Updated 2 years ago
- Automated Yara Rule generation using Biclustering☆59Updated 3 years ago
- Various capabilities for static malware analysis.☆75Updated 2 months ago
- Graph Representation of MITRE ATT&CK's CTI data☆48Updated 4 years ago