jazwiecki / neo4j-cve
Graph database version of the CVE database
☆25Updated 2 years ago
Alternatives and similar repositories for neo4j-cve:
Users that are interested in neo4j-cve are comparing it to the libraries listed below
- Network timing evaluation used to detect beacons, works with argus flow as the source☆20Updated 8 years ago
- Golang based web service to scan files with yara rules☆27Updated 7 years ago
- Bluehat 2018 Graphs for Security Workshop☆42Updated 6 years ago
- Tools for conducting analysis of CVE data in Elasticsearch☆74Updated last week
- Threat Mapping Catalogue☆17Updated 3 years ago
- ☆16Updated 6 years ago
- ☆30Updated 6 years ago
- A Zeek package that detects Zoom logins and meeting joins☆12Updated 5 years ago
- ☆20Updated 9 years ago
- Analysis of HTTP traffic and detection of anomalous user behavior in allowed actions. UEBA system.☆22Updated 2 years ago
- Graph Representation of MITRE ATT&CK's CTI data☆48Updated 5 years ago
- Extract relationships between cyber security entities within unstructured text☆23Updated 6 years ago
- A dsniff project using bro☆10Updated 9 years ago
- Simple Python bindings for the Hyperscan project.☆20Updated 8 years ago
- ☆33Updated 3 years ago
- ☆16Updated 6 years ago
- Artifacts of the USENIX Security 2022 paper "Spoki: Unveiling a New Wave of Scanners through a Reactive Network Telescope"☆17Updated 4 months ago
- Resources for CloudNative security research☆32Updated 3 years ago
- D4 core software (server and sample sensor client)☆42Updated last year
- A vulnerability assessment tool for system models