mal-lang / malcompiler
A compiler for the Meta Attack Language
☆15Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for malcompiler
- A MAL language that demonstrates the Maven project structure☆23Updated 2 years ago
- ☆16Updated 3 years ago
- The official Prelude-Correlator GitHub mirror of https://www.prelude-siem.org/projects/prelude-correlator/repository☆10Updated 3 years ago
- Growing collection of Spicy-based protocol and file analyzers for Zeek☆31Updated last month
- We publish indicators of compromise related to our stories here. See https://blog.team-cymru.com/ for more information.☆9Updated 3 years ago
- A vulnerability assessment tool for system models☆13Updated 3 years ago
- DigitalTwinSocCyberrange is a research project by the University of Regensburg and the Ionian University. This prototype aims to provide …☆7Updated 2 years ago
- OWASP Ontology-driven Threat Modelling framework☆36Updated last year
- ☆16Updated 5 years ago
- Artifacts of the USENIX Security 2022 paper "Spoki: Unveiling a New Wave of Scanners through a Reactive Network Telescope"☆17Updated 2 years ago
- Automated Yara Rule generation using Biclustering☆59Updated 3 years ago
- Automated dynamic security analysis by emulation of IoT firmware images in CI-pipelines.☆11Updated 3 years ago
- YAIDS - Yara-Based IDS - Yara as an Intrusion Detection System / Yet Another Intrusion Detection System - An Intrusion Detection System (…☆22Updated 2 years ago
- Posture Attribute Collection and Evaluation☆23Updated last year
- Open Source Tool - Cybersecurity Graph Database in Neo4j☆56Updated last year
- OWASP Threat Dragon with Gitlab Integration☆24Updated 7 years ago
- A place to systematically store software bill of materials (SBOM) documents.☆44Updated last year
- CyCAT.org taxonomies☆14Updated 3 years ago
- CredData is a set of files including credentials in open source projects. CredData includes suspicious lines with manual review results a…☆31Updated this week
- Graph Representation of MITRE ATT&CK's CTI data☆48Updated 4 years ago
- Scan pypi for typosquatting☆37Updated last year
- CVE Vulnerability scanner of your software bill of materials (SBOM). ASCII text input.☆17Updated 4 years ago
- Automated Security Risk Identification Using AutomationML-based Engineering Data☆27Updated 2 years ago
- Code for shelLM tool☆44Updated last week
- ☆19Updated 4 years ago
- A collection of prompt injection mitigation techniques.☆17Updated last year
- AnnoCTR corpus for detection and linking of entities in cyber threat reports☆16Updated 6 months ago
- Machine Learning applied to Cyber Security Course☆40Updated 5 years ago
- STIX 2.1 Visualizer, Attack and Activity Thread Graph for Threat Modeling☆32Updated last year