jazwiecki / neo4j-cve
Graph database version of the CVE database
☆25Updated 2 years ago
Alternatives and similar repositories for neo4j-cve:
Users that are interested in neo4j-cve are comparing it to the libraries listed below
- ☆30Updated 6 years ago
- Network timing evaluation used to detect beacons, works with argus flow as the source☆20Updated 8 years ago
- Open Source Tool - Cybersecurity Graph Database in Neo4j☆57Updated last year
- ☆16Updated 5 years ago
- This is a project of "Cybersecurity Event Detection with New and Re-emerging Words". (ASIACCS 2020)☆28Updated 11 months ago
- Import Mitre Att&ck into Neo4j database☆35Updated 2 years ago
- Bluehat 2018 Graphs for Security Workshop☆42Updated 6 years ago
- Graph Representation of MITRE ATT&CK's CTI data☆48Updated 5 years ago
- Threat Mapping Catalogue☆17Updated 3 years ago
- Golang based web service to scan files with yara rules☆27Updated 7 years ago
- A proof of concept implementation of the Siemens S7 protocol analyser for the Bro IDS.☆16Updated 8 years ago
- MALOnt - an ontology for Malware Threat Intelligence.☆10Updated 3 years ago
- Firepit - STIX Columnar Storage☆16Updated 9 months ago
- ☆9Updated 6 years ago
- Generate JSON force-directed/ node graph data from MITRE's ATTACK framework and visualize it interactively☆22Updated 3 years ago
- A Zeek package that detects Zoom logins and meeting joins☆12Updated 4 years ago
- CyCAT.org taxonomies☆14Updated 3 years ago
- OASIS-TAC-TC: OWL representation of the TAC TCs work products are maintained here. - https://github.com/oasis-tcs/tac-ontology☆16Updated 3 years ago
- My notes on various topics☆64Updated last year
- Analysis of HTTP traffic and detection of anomalous user behavior in allowed actions. UEBA system.☆22Updated 2 years ago
- Code for "Analyzing the Perceived Severity of Cybersecurity Threats Reported on Social Media".☆25Updated 5 years ago
- Analytics for Accounting logs from Network devices☆17Updated 4 years ago
- This project contains code for comparing or ranking APT capabilities and operational capacity. The metrics are meant to quantify, rank, o…☆35Updated 6 years ago
- Cuckoo Sandbox is an automated dynamic malware analysis system☆10Updated 4 years ago
- Pcaps for PeddleCheap and implant communication + script for interpreting and decrypting pcaps.☆15Updated 7 years ago
- Zeek scripts that provide an alternative log file logging TLS/SSL traffic☆10Updated 3 years ago
- This work shows the viability of automatically generated attack graphs that are used for adversary behavior execution in industrial contr…☆12Updated 3 years ago
- A vulnerability assessment tool for system models☆13Updated 3 years ago
- Vulnerability consolidation and management tool, enhances scan results by merging different findings of the same weakness across multiple…☆24Updated 2 years ago
- Checklist and tools for increasing security of Apache Airflow☆32Updated 3 years ago