mal-lang / enterpriseLangLinks
☆16Updated 4 years ago
Alternatives and similar repositories for enterpriseLang
Users that are interested in enterpriseLang are comparing it to the libraries listed below
Sorting:
- A dataset of software supply chain compromises. Please help us maintain it!☆129Updated 3 years ago
- A compiler for the Meta Attack Language☆15Updated 3 years ago
- A MAL language that demonstrates the Maven project structure☆23Updated last week
- CVE.ICU code.☆50Updated this week
- OWASP Ontology-driven Threat Modelling framework☆40Updated 2 years ago
- ☆20Updated 6 months ago
- Stakeholder-Specific Vulnerability Categorization☆171Updated 2 weeks ago
- OASIS TC Open Repository: CSAF Parser tool for parsing and checking the syntax of the Common Vulnerability Reporting Framework (CVRF) con…☆24Updated 3 years ago
- "Linking Threat Tactics, Techniques, and Patterns with Defensive Weaknesses, Vulnerabilities and Affected Platform Configurations for Cyb…☆104Updated 3 months ago
- A comprehensive, systematic and actionable way to understand attacker behaviors and techniques with respect to the software supply chain☆97Updated last year
- Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogue…☆88Updated 2 weeks ago
- 🚨ATTENTION🚨 The CVE mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here as…☆241Updated last year
- A repository with examples of CycloneDX BOMs (SBOM, SaaSBOM, OBOM, VEX, etc)☆215Updated 3 months ago
- A community collection of security reviews of open source software components.☆96Updated last year
- This repo is a consolidation of Secure Software Supply Chain resources, such as talks, whitepapers, conferences and more.☆139Updated 3 years ago
- Python API for vFeed Vulnerability & Threat Intelligence Database Enterprise & Pro Editions☆108Updated last week
- A taxonomy of attacks on software supply chains in the form of an attack tree, based on and linked to numerous real-world incidents and o…☆79Updated this week
- An ever-growing list of resources for data-driven vulnerability assessment and prioritization☆135Updated 2 years ago
- SysFlow documentation and issues tracker☆46Updated last year
- Project intended to make Attack Maps part of software development by reducing the time it takes to complete them.☆47Updated 9 years ago
- A Crowdsourcing Exchange for mapping various sources of security vulnerabilities, exposures, threats, and controls data☆27Updated 6 years ago
- Tools for conducting analysis of CVE data in Elasticsearch☆73Updated 6 months ago
- Vulnogram is the tool for reserving, managing, and publishing CVEs. Get started at vulnogram.org or deploy Docker edition for full enterp…☆214Updated 3 weeks ago
- Global Security Database☆318Updated last year
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆179Updated 2 months ago
- OASIS Cyber Threat Intelligence (CTI) TC: A repository for commonly used STIX objects in order to avoid needless duplication. https://gi…☆98Updated 8 months ago
- App that simplifies building decision trees to model adverse scenarios☆226Updated last year
- apt2sbom python package generates SPDX or CycloneDX files from Ubuntu APT and Python packaging information☆25Updated 4 years ago
- A comprehensive list of software composition analysis tools.☆163Updated 3 months ago
- StartLeft is an automation tool for generating Threat Models written in the Open Threat Model (OTM) format from a variety of different so…☆52Updated 2 months ago