jazwiecki / neo4j-cve
Graph database version of the CVE database
☆25Updated 2 years ago
Alternatives and similar repositories for neo4j-cve:
Users that are interested in neo4j-cve are comparing it to the libraries listed below
- Golang based web service to scan files with yara rules☆27Updated 7 years ago
- ☆16Updated 5 years ago
- Bluehat 2018 Graphs for Security Workshop☆42Updated 6 years ago
- Network timing evaluation used to detect beacons, works with argus flow as the source☆20Updated 8 years ago
- Hosted analyzers built for Grapl☆13Updated 2 years ago
- Extract relationships between cyber security entities within unstructured text☆23Updated 6 years ago
- ☆30Updated 6 years ago
- A Zeek package that detects Zoom logins and meeting joins☆12Updated 4 years ago
- alertflex controller☆10Updated last year
- Growing collection of Spicy-based protocol and file analyzers for Zeek☆32Updated 5 months ago
- My notes on various topics☆64Updated last year
- ☆33Updated 3 years ago
- CyCAT.org taxonomies☆14Updated 3 years ago
- Analytics for Accounting logs from Network devices☆17Updated 3 years ago
- Graph Representation of MITRE ATT&CK's CTI data☆48Updated 5 years ago
- Threat Mapping Catalogue☆17Updated 3 years ago
- OASIS-TAC-TC: OWL representation of the TAC TCs work products are maintained here. - https://github.com/oasis-tcs/tac-ontology☆16Updated 3 years ago
- Bro analyzer that detects Google's QUIC protocol☆10Updated 3 years ago
- A compiler for the Meta Attack Language☆16Updated 2 years ago
- ☆9Updated 6 years ago
- ☆33Updated 8 years ago
- STIX 2.1 Data Modeling Tool☆25Updated 7 months ago
- Import Mitre Att&ck into Neo4j database☆34Updated 2 years ago
- Generate JSON force-directed/ node graph data from MITRE's ATTACK framework and visualize it interactively☆22Updated 3 years ago
- A map displaying threat actors from the misp-galaxy☆32Updated 2 years ago
- Open Source Tool - Cybersecurity Graph Database in Neo4j☆57Updated last year
- This project contains code for comparing or ranking APT capabilities and operational capacity. The metrics are meant to quantify, rank, o…☆35Updated 5 years ago
- Code for "Analyzing the Perceived Severity of Cybersecurity Threats Reported on Social Media".☆25Updated 5 years ago
- ☆24Updated 4 years ago
- Checklist and tools for increasing security of Apache Airflow☆32Updated 3 years ago