mal-lang / malcompilerLinks
A compiler for the Meta Attack Language
☆15Updated 3 years ago
Alternatives and similar repositories for malcompiler
Users that are interested in malcompiler are comparing it to the libraries listed below
Sorting:
- ☆15Updated 4 years ago
- OWASP Ontology-driven Threat Modelling framework☆38Updated 2 years ago
- Growing collection of Spicy-based protocol and file analyzers for Zeek☆31Updated 10 months ago
- A MAL language that demonstrates the Maven project structure☆23Updated 3 years ago
- OWASP Threat Dragon with Gitlab Integration☆27Updated 7 years ago
- Extensible Platform for Malware Analysis☆17Updated 4 years ago
- Open Source Tool - Cybersecurity Graph Database in Neo4j☆61Updated last year
- Python API for vFeed Vulnerability & Threat Intelligence Database Enterprise & Pro Editions☆102Updated 2 years ago
- A collection of resources for security data☆41Updated 7 years ago
- Stratosphere uses password generation algorithms to discover publicly accessible cloud storage buckets.☆28Updated 4 years ago
- A Zeek package that detects Zoom logins and meeting joins☆12Updated 5 years ago
- Graph database version of the CVE database☆26Updated 2 years ago
- A dataset of software supply chain compromises. Please help us maintain it!☆129Updated 2 years ago
- Exploit, Malware and Vulnerability Scoring Application☆13Updated last year
- Graph Representation of MITRE ATT&CK's CTI data☆48Updated 5 years ago
- CVE.ICU code.☆43Updated this week
- A completely automated anomaly detector Zeek network flows files (conn.log).☆82Updated 11 months ago
- A Crowdsourcing Exchange for mapping various sources of security vulnerabilities, exposures, threats, and controls data☆26Updated 6 years ago
- Utility for parsing Bro log files into CSV or JSON format☆41Updated 2 years ago
- "Linking Threat Tactics, Techniques, and Patterns with Defensive Weaknesses, Vulnerabilities and Affected Platform Configurations for Cyb…☆95Updated last year
- Economics of Ransomware | Dataset☆15Updated 7 years ago
- OASIS Cyber Threat Intelligence (CTI) TC: A tool for generating STIX content for prototyping and testing. https://github.com/oasis-open/c…☆41Updated last year
- This program generates cyber attack scenarios for use in cyber training exercises, red team planning, blue team planning, automated attac…☆28Updated 4 years ago
- MALOnt - an ontology for Malware Threat Intelligence.☆11Updated 4 years ago
- MulVAL: A logic-based, data-driven enterprise network security analyzer - Originally developed at Kansas State University, updated for Cy…☆34Updated last year
- Posture Attribute Collection and Evaluation☆23Updated 2 years ago
- Adversary Emulation Planner☆41Updated last year
- YAIDS - Yara-Based IDS - Yara as an Intrusion Detection System / Yet Another Intrusion Detection System - An Intrusion Detection System (…☆24Updated 2 years ago
- An anomaly-based intrusion detection system.☆83Updated 2 years ago
- Bluehat 2018 Graphs for Security Workshop☆42Updated 6 years ago