mal-lang / malcompilerLinks
A compiler for the Meta Attack Language
☆15Updated 3 years ago
Alternatives and similar repositories for malcompiler
Users that are interested in malcompiler are comparing it to the libraries listed below
Sorting:
- ☆16Updated 4 years ago
- OWASP Ontology-driven Threat Modelling framework☆39Updated 2 years ago
- Growing collection of Spicy-based protocol and file analyzers for Zeek☆31Updated last year
- Python API for vFeed Vulnerability & Threat Intelligence Database Enterprise & Pro Editions☆104Updated last week
- The Advanced Vulnerability Information Sharing Environment -- A Platform for CVD and PSIRT Management☆10Updated last year
- This program generates cyber attack scenarios for use in cyber training exercises, red team planning, blue team planning, automated attac…☆32Updated 4 years ago
- Open Source Tool - Cybersecurity Graph Database in Neo4j☆67Updated 2 years ago
- Adversary Emulation Planner☆42Updated last year
- MALOnt - an ontology for Malware Threat Intelligence.☆13Updated 4 years ago
- ☆77Updated last month
- A Zeek package that detects Zoom logins and meeting joins☆12Updated 5 years ago
- YAIDS - Yara-Based IDS - Yara as an Intrusion Detection System / Yet Another Intrusion Detection System - An Intrusion Detection System (…☆26Updated 3 years ago
- GPT-3 use cases for Cybersecurity☆53Updated 2 years ago
- CVE.ICU code.☆49Updated this week
- Economics of Ransomware | Dataset☆15Updated 7 years ago
- Import Mitre Att&ck into Neo4j database☆38Updated 3 years ago
- A MAL language that demonstrates the Maven project structure☆23Updated 2 weeks ago
- Posture Attribute Collection and Evaluation☆24Updated 2 years ago
- Graph Representation of MITRE ATT&CK's CTI data☆50Updated 6 years ago
- ☆46Updated 2 years ago
- OASIS Cyber Threat Intelligence (CTI) TC: A tool for generating STIX content for prototyping and testing. https://github.com/oasis-open/c…☆42Updated last year
- A dataset of software supply chain compromises. Please help us maintain it!☆130Updated 3 years ago
- A proof of concept implementation of the Siemens S7 protocol analyser for the Bro IDS.☆16Updated 8 years ago
- Linux based vulnerabilities (CVE) exploit detection through runtime security using Falco/Osquery/Yara/Sigma☆21Updated 2 years ago
- Static Token And Credential Scanner☆95Updated 2 years ago
- Script to create MITRE ATT&CK Navigator layers from the annotated detection rules in Elastic Security (Kibana).☆20Updated 2 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆75Updated 3 years ago
- ☆45Updated 3 years ago
- STIX 2.1 Visualizer, Attack and Activity Thread Graph for Threat Modeling☆33Updated last year
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout for…☆38Updated 3 years ago