mal-lang / malcompilerLinks
A compiler for the Meta Attack Language
☆15Updated 3 years ago
Alternatives and similar repositories for malcompiler
Users that are interested in malcompiler are comparing it to the libraries listed below
Sorting:
- A MAL language that demonstrates the Maven project structure☆23Updated 3 years ago
- ☆15Updated 3 years ago
- OWASP Ontology-driven Threat Modelling framework☆37Updated last year
- A Zeek package that detects Zoom logins and meeting joins☆12Updated 5 years ago
- Graph Representation of MITRE ATT&CK's CTI data☆48Updated 5 years ago
- Adversary Emulation Planner☆39Updated 11 months ago
- MALOnt - an ontology for Malware Threat Intelligence.☆10Updated 3 years ago
- The official Prelude-Correlator GitHub mirror of https://www.prelude-siem.org/projects/prelude-correlator/repository☆10Updated 4 years ago
- YAIDS - Yara-Based IDS - Yara as an Intrusion Detection System / Yet Another Intrusion Detection System - An Intrusion Detection System (…☆24Updated 2 years ago
- Economics of Ransomware | Dataset☆15Updated 7 years ago
- This program generates cyber attack scenarios for use in cyber training exercises, red team planning, blue team planning, automated attac…☆26Updated 4 years ago
- ☆19Updated 4 years ago
- VulZoo: A Comprehensive Vulnerability Intelligence Dataset (ASE 2024 Demo)☆48Updated 2 months ago
- CyCAT.org API back-end server including crawlers☆29Updated 2 years ago
- Security Weaknesses in Machine Learning☆15Updated last year
- CyCAT.org taxonomies☆15Updated 4 years ago
- STIX 2.1 Visualizer, Attack and Activity Thread Graph for Threat Modeling☆32Updated 5 months ago
- Incremental Machine Leaning by example - Detecting suspicious activity in real time with Zeek data streams, River and JA3 hashes☆16Updated 2 years ago
- Code for shelLM tool☆54Updated 4 months ago
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆11Updated 3 years ago
- This repository hosts community contributed Kestrel analytics☆17Updated last year
- A collection of prompt injection mitigation techniques.☆23Updated last year
- Threat Detection Rules (Snort/Sigma/Yara)☆13Updated last year
- Open Source Tool - Cybersecurity Graph Database in Neo4j☆62Updated last year
- Python API for vFeed Vulnerability & Threat Intelligence Database Enterprise & Pro Editions☆101Updated 2 years ago
- Growing collection of Spicy-based protocol and file analyzers for Zeek☆31Updated 8 months ago
- Graph database version of the CVE database☆25Updated 2 years ago
- Posture Attribute Collection and Evaluation☆23Updated last year
- A Crowdsourcing Exchange for mapping various sources of security vulnerabilities, exposures, threats, and controls data☆26Updated 6 years ago
- A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports☆24Updated last year