mal-lang / malcompilerLinks
A compiler for the Meta Attack Language
☆15Updated 3 years ago
Alternatives and similar repositories for malcompiler
Users that are interested in malcompiler are comparing it to the libraries listed below
Sorting:
- ☆15Updated 4 years ago
- OWASP Ontology-driven Threat Modelling framework☆40Updated 2 years ago
- CVE.ICU code.☆46Updated this week
- Growing collection of Spicy-based protocol and file analyzers for Zeek☆31Updated 11 months ago
- A Zeek package that detects Zoom logins and meeting joins☆12Updated 5 years ago
- Python API for vFeed Vulnerability & Threat Intelligence Database Enterprise & Pro Editions☆102Updated 2 years ago
- Posture Attribute Collection and Evaluation☆23Updated 2 years ago
- A MAL language that demonstrates the Maven project structure☆23Updated 3 years ago
- ☆28Updated 2 months ago
- Adversary Emulation Planner☆41Updated last year
- Open Source Tool - Cybersecurity Graph Database in Neo4j☆62Updated last year
- ☆19Updated 4 years ago
- A dataset of software supply chain compromises. Please help us maintain it!☆130Updated 2 years ago
- EPSS(Exploit Prediction Scoring System) API client☆19Updated this week
- Crashbench is a LLM benchmark to measure bug-finding and reporting capabilities of LLMs☆13Updated 10 months ago
- OWASP Threat Dragon with Gitlab Integration☆27Updated 7 years ago
- YAIDS - Yara-Based IDS - Yara as an Intrusion Detection System / Yet Another Intrusion Detection System - An Intrusion Detection System (…☆24Updated 2 years ago
- A proof of concept implementation of the Siemens S7 protocol analyser for the Bro IDS.☆16Updated 8 years ago
- MALOnt - an ontology for Malware Threat Intelligence.☆11Updated 4 years ago
- The Advanced Vulnerability Information Sharing Environment -- A Platform for CVD and PSIRT Management☆10Updated last year
- Global Security Database Tools☆43Updated last year
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆11Updated 3 years ago
- This program generates cyber attack scenarios for use in cyber training exercises, red team planning, blue team planning, automated attac…☆30Updated 4 years ago
- A repository to store Rad Fingerprinting data.☆24Updated last year
- A Crowdsourcing Exchange for mapping various sources of security vulnerabilities, exposures, threats, and controls data☆27Updated 6 years ago
- Severity scoring and exploit categorisation for vulnerability reports using machine-learning tools.☆24Updated 2 years ago
- Graph Representation of MITRE ATT&CK's CTI data☆49Updated 5 years ago
- ATLAS tactics, techniques, and case studies data☆77Updated 2 weeks ago
- Security Weaknesses in Machine Learning☆15Updated 2 years ago
- A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports☆24Updated 2 years ago