mal-lang / malcompilerLinks
A compiler for the Meta Attack Language
☆15Updated 3 years ago
Alternatives and similar repositories for malcompiler
Users that are interested in malcompiler are comparing it to the libraries listed below
Sorting:
- ☆15Updated 4 years ago
- OWASP Ontology-driven Threat Modelling framework☆41Updated 2 years ago
- A Zeek package that detects Zoom logins and meeting joins☆12Updated 5 years ago
- OWASP Threat Dragon with Gitlab Integration☆27Updated 7 years ago
- Adversary Emulation Planner☆42Updated last year
- A MAL language that demonstrates the Maven project structure☆23Updated 3 years ago
- Growing collection of Spicy-based protocol and file analyzers for Zeek☆31Updated last year
- Security Weaknesses in Machine Learning☆15Updated 2 years ago
- Python API for vFeed Vulnerability & Threat Intelligence Database Enterprise & Pro Editions☆102Updated 2 weeks ago
- A dataset of software supply chain compromises. Please help us maintain it!☆130Updated 3 years ago
- Open Source Tool - Cybersecurity Graph Database in Neo4j☆65Updated 2 years ago
- The Advanced Vulnerability Information Sharing Environment -- A Platform for CVD and PSIRT Management☆10Updated last year
- A collection of resources for security data☆41Updated 7 years ago
- YAIDS - Yara-Based IDS - Yara as an Intrusion Detection System / Yet Another Intrusion Detection System - An Intrusion Detection System (…☆25Updated 2 years ago
- Static Token And Credential Scanner☆95Updated 2 years ago
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆11Updated 3 years ago
- OASIS Cyber Threat Intelligence (CTI) TC: A tool for generating STIX content for prototyping and testing. https://github.com/oasis-open/c…☆42Updated last year
- This program generates cyber attack scenarios for use in cyber training exercises, red team planning, blue team planning, automated attac…☆30Updated 4 years ago
- ☆46Updated 2 years ago
- Utility for parsing Bro log files into CSV or JSON format☆41Updated 2 years ago
- A curated list of resources to deep dive into the intersection of applied machine learning and threat detection.☆19Updated 5 years ago
- CVE.ICU code.☆46Updated this week
- Examples on how to maintain security/compliance as code and to automate SecOps using the JupiterOne platform.☆54Updated last year
- Graph Representation of MITRE ATT&CK's CTI data☆49Updated 5 years ago
- A completely automated anomaly detector Zeek network flows files (conn.log).☆81Updated 2 months ago
- MALOnt - an ontology for Malware Threat Intelligence.☆11Updated 4 years ago
- Short deep dive into Threat Hunting on AWS☆14Updated 2 years ago
- CyATP: Cybersecurity Awareness Training Platform☆23Updated 3 years ago
- The growing network connectivity witnessed in Supervisory Control and Data Acquisition (SCADA) systems raises cyber security concerns for…☆19Updated 7 years ago
- EPSS(Exploit Prediction Scoring System) API client☆19Updated this week