mal-lang / enterpriseLang
☆16Updated 3 years ago
Alternatives and similar repositories for enterpriseLang:
Users that are interested in enterpriseLang are comparing it to the libraries listed below
- A compiler for the Meta Attack Language☆16Updated 2 years ago
- Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogue…☆54Updated last week
- A MAL language that demonstrates the Maven project structure☆23Updated 3 years ago
- OWASP Ontology-driven Threat Modelling framework☆37Updated last year
- StartLeft is an automation tool for generating Threat Models written in the Open Threat Model (OTM) format from a variety of different so…☆49Updated this week
- 🚨ATTENTION🚨 The CVE mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here as…☆235Updated 11 months ago
- "Linking Threat Tactics, Techniques, and Patterns with Defensive Weaknesses, Vulnerabilities and Affected Platform Configurations for Cyb…☆93Updated 8 months ago
- A dataset of software supply chain compromises. Please help us maintain it!☆127Updated 2 years ago
- Security Control Knowledge Graph☆27Updated 10 months ago
- Python API for vFeed Vulnerability & Threat Intelligence Database Enterprise & Pro Editions☆100Updated last year
- Public static website for the D3FEND project. For the D3FEND ontology repo see: https://github.com/d3fend/d3fend-ontology☆76Updated last week
- Autoconfigured ELK Stack That Contains All EPSS and NVD CVE Data☆49Updated 8 months ago
- Project intended to make Attack Maps part of software development by reducing the time it takes to complete them.☆48Updated 8 years ago
- Open Source Tool - Cybersecurity Graph Database in Neo4j☆56Updated last year
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆61Updated 8 months ago
- Sensor Mappings to ATT&CK is a collection of resources to assist cyber defenders with understanding which sensors and events can help det…☆49Updated 3 weeks ago
- Stakeholder-Specific Vulnerability Categorization☆139Updated this week
- ☆32Updated 3 years ago
- Posture Attribute Collection and Evaluation☆24Updated last year
- ☆19Updated 4 years ago
- Software Component Verification Standard (SCVS)☆141Updated 10 months ago
- A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports☆23Updated last year
- A Crowdsourcing Exchange for mapping various sources of security vulnerabilities, exposures, threats, and controls data☆26Updated 5 years ago
- Tools for conducting analysis of CVE data in Elasticsearch☆74Updated this week
- VulDB Python scripts to fetch data via API☆20Updated 5 years ago
- Sharing software supply chain security open source projects☆46Updated 2 years ago
- OWASP Foundation Threat Dragon Project Web Repository☆78Updated last week
- Kubernetes Pwnage for all☆56Updated 4 years ago
- CALDERA plugin for adversary emulation of AI-enabled systems☆93Updated last year
- Exploit Prediction Scoring System (EPSS)☆24Updated 2 years ago