mal-lang / malcompiler
A compiler for the Meta Attack Language
☆16Updated 2 years ago
Alternatives and similar repositories for malcompiler:
Users that are interested in malcompiler are comparing it to the libraries listed below
- A MAL language that demonstrates the Maven project structure☆23Updated 3 years ago
- ☆16Updated 3 years ago
- OWASP Ontology-driven Threat Modelling framework☆37Updated last year
- Graph Representation of MITRE ATT&CK's CTI data☆48Updated 5 years ago
- Artifacts of the USENIX Security 2022 paper "Spoki: Unveiling a New Wave of Scanners through a Reactive Network Telescope"☆18Updated 3 months ago
- This program generates cyber attack scenarios for use in cyber training exercises, red team planning, blue team planning, automated attac…☆26Updated 3 years ago
- MALOnt - an ontology for Malware Threat Intelligence.☆10Updated 3 years ago
- EPSS(Exploit Prediction Scoring System) API client☆18Updated this week
- Simulates a compromise in a cloud and container environment☆32Updated 2 months ago
- A Crowdsourcing Exchange for mapping various sources of security vulnerabilities, exposures, threats, and controls data☆26Updated 5 years ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆25Updated 3 years ago
- CyCAT.org taxonomies☆14Updated 3 years ago
- Open Source Tool - Cybersecurity Graph Database in Neo4j☆56Updated last year
- Python API for vFeed Vulnerability & Threat Intelligence Database Enterprise & Pro Editions☆100Updated last year
- Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogue…☆54Updated this week
- Incremental Machine Leaning by example - Detecting suspicious activity in real time with Zeek data streams, River and JA3 hashes☆15Updated 2 years ago
- YAIDS - Yara-Based IDS - Yara as an Intrusion Detection System / Yet Another Intrusion Detection System - An Intrusion Detection System (…☆22Updated 2 years ago
- OWASP Threat Dragon with Gitlab Integration☆25Updated 7 years ago
- Economics of Ransomware | Dataset☆16Updated 6 years ago
- A library and command line tool for extracting indicators of compromise (IOCs) from security reports in PDF, HTML, Word, or text format☆31Updated last month
- Reference architecture and proof of concept implementation for supply chain security gateway☆23Updated last year
- The instructions provide a simpler way to install and run openvas docker container. The script automates the process of scanning a host p…☆16Updated 6 years ago
- Exercises for (legacy) Computer Security course in the University of Oulu☆44Updated last year
- Public Code for ICS Evasion Attack Generation☆42Updated 3 years ago
- Adversary Emulation Planner☆38Updated 8 months ago
- CVE.ICU code.☆39Updated this week
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆11Updated 2 years ago
- Maturity Model Collaborative project☆14Updated 2 years ago
- List CVEs and details that apply to your infrastructure (pre-inventoried).☆10Updated 4 years ago
- Graph database version of the CVE database☆25Updated 2 years ago