mal-lang / enterpriseLang
☆16Updated 3 years ago
Alternatives and similar repositories for enterpriseLang:
Users that are interested in enterpriseLang are comparing it to the libraries listed below
- A compiler for the Meta Attack Language☆16Updated 2 years ago
- A MAL language that demonstrates the Maven project structure☆23Updated 2 years ago
- OWASP Ontology-driven Threat Modelling framework☆37Updated last year
- Stakeholder-Specific Vulnerability Categorization☆136Updated this week
- Python API for vFeed Vulnerability & Threat Intelligence Database Enterprise & Pro Editions☆99Updated last year
- "Linking Threat Tactics, Techniques, and Patterns with Defensive Weaknesses, Vulnerabilities and Affected Platform Configurations for Cyb…☆92Updated 6 months ago
- A dataset of software supply chain compromises. Please help us maintain it!☆127Updated 2 years ago
- 🚨ATTENTION🚨 The CVE mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here as…☆234Updated 9 months ago
- Open Source Tool - Cybersecurity Graph Database in Neo4j☆57Updated last year
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆70Updated 8 months ago
- Public static website for the D3FEND project. For the D3FEND ontology repo see: https://github.com/d3fend/d3fend-ontology☆75Updated last month
- Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogue…☆50Updated this week
- CVE.ICU code.☆38Updated this week
- VINCE is the Vulnerability Information and Coordination Environment developed and used by the CERT Coordination Center to improve coordin…☆60Updated last month
- Autoconfigured ELK Stack That Contains All EPSS and NVD CVE Data☆48Updated 6 months ago
- OASIS TC Open Repository: CSAF Parser tool for parsing and checking the syntax of the Common Vulnerability Reporting Framework (CVRF) con…☆23Updated 2 years ago
- Sensor Mappings to ATT&CK is a collection of resources to assist cyber defenders with understanding which sensors and events can help det…☆49Updated 7 months ago
- Security Control Knowledge Graph☆26Updated 9 months ago
- Posture Attribute Collection and Evaluation☆24Updated last year
- Adversary Emulation Planner☆38Updated 7 months ago
- A Crowdsourcing Exchange for mapping various sources of security vulnerabilities, exposures, threats, and controls data☆26Updated 5 years ago
- A logic-based enterprise network security analyzer☆112Updated 2 years ago
- CISA CSAF Security Advisories☆58Updated this week
- OASIS CACAO TC: Official repository for work of the CACAO TC https://github.com/oasis-tcs/cacao☆28Updated last year
- Extensible framework for analyzing publicly available information about vulnerabilities☆109Updated last month
- A repository with examples of CycloneDX BOMs (SBOM, SaaSBOM, OBOM, VEX, etc)☆190Updated last month
- Development of the NIST vulnerability data ontology (Vulntology).☆37Updated 8 months ago
- Tools for conducting analysis of CVE data in Elasticsearch☆74Updated 6 months ago
- TIE is a machine learning model for inferring associated MITRE ATT&CK techniques from previously observed techniques.☆39Updated 3 months ago
- A python app to predict Att&ck tactics and techniques from cyber threat reports☆118Updated last year