jazwiecki / neo4j-cve
Graph database version of the CVE database
☆25Updated 2 years ago
Alternatives and similar repositories for neo4j-cve:
Users that are interested in neo4j-cve are comparing it to the libraries listed below
- A compiler for the Meta Attack Language☆16Updated 2 years ago
- Network timing evaluation used to detect beacons, works with argus flow as the source☆19Updated 8 years ago
- Vulnerability consolidation and management tool, enhances scan results by merging different findings of the same weakness across multiple…☆24Updated 2 years ago
- Golang based web service to scan files with yara rules☆27Updated 7 years ago
- Bluehat 2018 Graphs for Security Workshop☆42Updated 6 years ago
- ☆30Updated 6 years ago
- ☆16Updated 6 years ago
- Graph Representation of MITRE ATT&CK's CTI data☆48Updated 5 years ago
- Tools for conducting analysis of CVE data in Elasticsearch☆74Updated 6 months ago
- Hosted analyzers built for Grapl☆13Updated 2 years ago
- CVE.ICU code.☆37Updated this week
- OASIS-TAC-TC: OWL representation of the TAC TCs work products are maintained here. - https://github.com/oasis-tcs/tac-ontology☆16Updated 3 years ago
- This is a project of "Cybersecurity Event Detection with New and Re-emerging Words". (ASIACCS 2020)☆28Updated 9 months ago
- A vulnerability assessment tool for system models☆13Updated 3 years ago
- A Zeek package that detects Zoom logins and meeting joins☆12Updated 4 years ago
- Checklist and tools for increasing security of Apache Airflow☆32Updated 3 years ago
- Threat Mapping Catalogue☆17Updated 3 years ago
- Extract cyber security entities from unstructured text☆33Updated 7 years ago
- Import Mitre Att&ck into Neo4j database☆34Updated 2 years ago
- ☆16Updated 5 years ago
- This project contains code for comparing or ranking APT capabilities and operational capacity. The metrics are meant to quantify, rank, o…☆35Updated 5 years ago
- A proof of concept implementation of the Siemens S7 protocol analyser for the Bro IDS.☆16Updated 7 years ago
- CTI database generator and public dataset☆21Updated 5 years ago
- This tool maps a file's behavior on MITRE ATT&CK matrix.☆57Updated 4 years ago
- Sweet, sweet, secrepo.com html.☆131Updated 3 years ago
- ☆33Updated 3 years ago
- ☆9Updated 6 years ago
- Analytics for Accounting logs from Network devices☆16Updated 3 years ago
- Vulnerability Information Aggregator for CVEs☆120Updated 5 years ago