neo4j-examples / cybersecurity-demo
Neo4j Cybersecurity Demo
☆18Updated 3 years ago
Alternatives and similar repositories for cybersecurity-demo:
Users that are interested in cybersecurity-demo are comparing it to the libraries listed below
- Open Source Tool - Cybersecurity Graph Database in Neo4j☆57Updated last year
- Generative AI Governance for Enterprises☆15Updated 2 months ago
- OWASP Ontology-driven Threat Modelling framework☆37Updated last year
- Security Control Knowledge Graph☆28Updated 11 months ago
- ATLAS tactics, techniques, and case studies data☆58Updated 2 weeks ago
- Explore AI Supply Chain Risk with the AI Risk Database☆53Updated 10 months ago
- NIST OSCAL SDK and CLI☆18Updated 8 months ago
- A repository containing experimental and upcoming pipelines and features for Morpheus☆24Updated 2 weeks ago
- Security and compliance proxy for LLM APIs☆46Updated last year
- ☁️ 🤖 LLM agent-based simulations to generate benign and malicious Cloud logs☆12Updated 8 months ago
- The official Prelude-Correlator GitHub mirror of https://www.prelude-siem.org/projects/prelude-correlator/repository☆10Updated 3 years ago
- ☆30Updated last month
- Mapping Corelight or Zeek data to Elastic Common Schema fields☆34Updated last month
- 🤖 A GitHub action that leverages fabric patterns through an agent-based approach☆20Updated 2 months ago
- A JupyterLab extension to evaluate the security of your Jupyter environment☆39Updated last year
- Demo setup for compliance-trestle☆33Updated last week
- ☆19Updated 8 months ago
- DefectDojo Community Content☆17Updated 5 months ago
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆61Updated 9 months ago
- StartLeft is an automation tool for generating Threat Models written in the Open Threat Model (OTM) format from a variety of different so…☆50Updated this week
- Risks and targets for assessing LLMs & LLM vulnerabilities☆30Updated 10 months ago
- ☆15Updated 3 months ago
- Dependency and root cause analysis and more for network and IT management graph example☆27Updated 5 months ago
- ☆20Updated last week
- Repository for on-going work as part of the AIBOM Tiger Team effort.☆19Updated 6 months ago
- The project serves as a strategic advisory tool, capitalizing on the ZySec series of AI models to amplify the capabilities of security pr…☆45Updated 10 months ago
- The NORIA-O project is a data model for IT networks, events and operations information. The ontology is developed using web technologies …☆22Updated last month
- Open source cyber-serenity platform that help the security teams designing and managing companies' ISMS, and which allow them to create r…☆15Updated last week
- This project will work towards a fully-functional autonomous intelligent cyberdefense agent with increasingly advanced capabilities that …☆29Updated 2 months ago
- ☆15Updated 8 years ago