mal-lang / malcompilerLinks
A compiler for the Meta Attack Language
☆15Updated 3 years ago
Alternatives and similar repositories for malcompiler
Users that are interested in malcompiler are comparing it to the libraries listed below
Sorting:
- ☆16Updated 4 years ago
- OWASP Ontology-driven Threat Modelling framework☆40Updated 2 years ago
- A Zeek package that detects Zoom logins and meeting joins☆12Updated 5 years ago
- Growing collection of Spicy-based protocol and file analyzers for Zeek☆32Updated last year
- OWASP Threat Dragon with Gitlab Integration☆27Updated 8 years ago
- Python API for vFeed Vulnerability & Threat Intelligence Database Enterprise & Pro Editions☆107Updated last week
- Graph Representation of MITRE ATT&CK's CTI data☆51Updated 6 years ago
- Structured Threat Intelligence Graph☆99Updated last month
- A MAL language that demonstrates the Maven project structure☆23Updated this week
- A curated list of resources to deep dive into the intersection of applied machine learning and threat detection.☆19Updated 5 years ago
- A proof of concept implementation of the Siemens S7 protocol analyser for the Bro IDS.☆16Updated 8 years ago
- Utility for parsing Bro log files into CSV or JSON format☆41Updated 3 years ago
- CVE.ICU code.☆50Updated this week
- Economics of Ransomware | Dataset☆15Updated 7 years ago
- Adversary Emulation Planner☆42Updated last month
- A dataset of software supply chain compromises. Please help us maintain it!☆129Updated 3 years ago
- ☆19Updated 5 years ago
- The Advanced Vulnerability Information Sharing Environment -- A Platform for CVD and PSIRT Management☆10Updated 2 years ago
- CyCAT.org taxonomies☆15Updated 4 years ago
- OASIS Cyber Threat Intelligence (CTI) TC: A tool for generating STIX content for prototyping and testing. https://github.com/oasis-open/c…☆43Updated last year
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Updated 5 years ago
- ☆47Updated 2 years ago
- Script to create MITRE ATT&CK Navigator layers from the annotated detection rules in Elastic Security (Kibana).☆20Updated 2 years ago
- Posture Attribute Collection and Evaluation☆23Updated 2 years ago
- Security Weaknesses in Machine Learning☆15Updated 2 years ago
- EPSS(Exploit Prediction Scoring System) API client☆20Updated 3 months ago
- Import Mitre Att&ck into Neo4j database☆39Updated 3 years ago
- Linux based vulnerabilities (CVE) exploit detection through runtime security using Falco/Osquery/Yara/Sigma☆21Updated 2 years ago
- Open Source Tool - Cybersecurity Graph Database in Neo4j☆66Updated 2 years ago
- ☆32Updated 3 weeks ago