mal-lang / malcompilerLinks
A compiler for the Meta Attack Language
☆15Updated 3 years ago
Alternatives and similar repositories for malcompiler
Users that are interested in malcompiler are comparing it to the libraries listed below
Sorting:
- ☆16Updated 4 years ago
- OWASP Ontology-driven Threat Modelling framework☆39Updated 2 years ago
- A Zeek package that detects Zoom logins and meeting joins☆12Updated 5 years ago
- A MAL language that demonstrates the Maven project structure☆23Updated last week
- Python API for vFeed Vulnerability & Threat Intelligence Database Enterprise & Pro Editions☆106Updated 3 weeks ago
- Growing collection of Spicy-based protocol and file analyzers for Zeek☆32Updated last year
- Adversary Emulation Planner☆42Updated last week
- CVE.ICU code.☆50Updated last week
- DigitalTwinSocCyberrange is a research project by the University of Regensburg and the Ionian University. This prototype aims to provide …☆11Updated 3 years ago
- ☆31Updated last week
- OWASP Threat Dragon with Gitlab Integration☆27Updated 8 years ago
- The Advanced Vulnerability Information Sharing Environment -- A Platform for CVD and PSIRT Management☆10Updated last year
- OASIS Cyber Threat Intelligence (CTI) TC: A tool for generating STIX content for prototyping and testing. https://github.com/oasis-open/c…☆43Updated last year
- ☆21Updated 2 years ago
- Utility for parsing Bro log files into CSV or JSON format☆42Updated 3 years ago
- Graph Representation of MITRE ATT&CK's CTI data☆51Updated 6 years ago
- Incremental Machine Leaning by example - Detecting suspicious activity in real time with Zeek data streams, River and JA3 hashes☆15Updated 3 years ago
- Posture Attribute Collection and Evaluation☆23Updated 2 years ago
- Firepit - STIX Columnar Storage☆17Updated last year
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆68Updated 6 months ago
- Static Token And Credential Scanner☆95Updated 2 years ago
- ☆19Updated 5 years ago
- Economics of Ransomware | Dataset☆15Updated 7 years ago
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Updated 5 years ago
- MALOnt - an ontology for Malware Threat Intelligence.☆13Updated 4 years ago
- A curated list of resources to deep dive into the intersection of applied machine learning and threat detection.☆19Updated 5 years ago
- ☆44Updated 4 years ago
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆10Updated 3 years ago
- Global Security Database Tools☆43Updated 2 years ago
- This is a repository to experiment with MCP for security☆45Updated 11 months ago