Repository for accompanying materials to Threat Knowledge Graphs.
☆18Jul 16, 2025Updated 8 months ago
Alternatives and similar repositories for threat-knowledge-graph
Users that are interested in threat-knowledge-graph are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CVE\CWE\CAPEC\ATT&CK, security knowledge graph, knowledge graph completion☆14Jun 9, 2023Updated 2 years ago
- ☆12Jan 16, 2023Updated 3 years ago
- The SEPSES Cyber-KB Engine☆27Nov 27, 2024Updated last year
- ☆17Aug 26, 2025Updated 6 months ago
- Machine learning on knowledge graphs for context-aware security monitoring (data and model)☆18Mar 11, 2022Updated 4 years ago
- The repository consists of : Construction of the corpus, Named Entity Recognition , Relationship Extraction , Construction of knowledge g…☆36Dec 5, 2022Updated 3 years ago
- KG☆14Nov 26, 2022Updated 3 years ago
- Neo4j Cybersecurity Demo☆18Mar 16, 2022Updated 4 years ago
- Reinforcement learning (RL) is an effective method to find reasoning pathways in incomplete knowledge graphs (KGs). To overcome the chall…☆26Oct 13, 2024Updated last year
- [ICLR 2025 SCI-FM Workshop] Lemur: Log Parsing with Entropy Sampling and Chain-of-Thought Merging☆14Mar 27, 2025Updated 11 months ago
- Parallel Quantum Annealing☆10Jan 7, 2023Updated 3 years ago
- This repository is the tutorial for the IsitObservable Episode on Fluentd☆11May 7, 2025Updated 10 months ago
- ☆11Oct 7, 2023Updated 2 years ago
- AI featured threat modeling and security review project☆17Nov 17, 2024Updated last year
- A GitHub workflow to identify employees that have leaked your organization's code☆13May 23, 2023Updated 2 years ago
- State of vulnerabilties report☆11Feb 20, 2020Updated 6 years ago
- The Security Toolkit for managing Generative AI(especially LLMs) and Supervised Learning processes(Learning and Inference).☆22Jun 25, 2025Updated 8 months ago
- Collating an overview of the open source software supply chain landscape -- and synthesizing that survey in a hopefully-useful way.☆33Apr 4, 2023Updated 2 years ago
- ☆12Jul 18, 2024Updated last year
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Aug 18, 2022Updated 3 years ago
- Import Mitre Att&ck into Neo4j database☆39Mar 5, 2026Updated 2 weeks ago
- An Antlr4 Grammar for OPENQASM 2.0☆17Feb 21, 2018Updated 8 years ago
- ☆21Mar 2, 2024Updated 2 years ago
- AnnoCTR corpus for detection and linking of entities in cyber threat reports☆27Apr 12, 2024Updated last year
- R-GCN知识 图谱推理☆32Dec 3, 2024Updated last year
- EMNLP 22' (Oral): SQUIRE: A Sequence-to-sequence Framework for Multi-hop Knowledge Graph Reasoning☆35Jun 8, 2023Updated 2 years ago
- Scanning alive hosts of the given CIDR range in parallel.☆10May 8, 2025Updated 10 months ago
- Official repository for MalKG☆24Feb 12, 2021Updated 5 years ago
- Repository for LabRAD tutorials and resources sharing.☆20Jul 8, 2015Updated 10 years ago
- API client for libraries.io written in Go☆11Jun 7, 2017Updated 8 years ago
- An example network of some tricks for projection mapping in TouchDesigner☆27Jan 16, 2020Updated 6 years ago
- System Call Integrity Layer - experimental security research☆25Jan 31, 2026Updated last month
- Output Go structure template from JSON structure☆10May 11, 2015Updated 10 years ago
- Scripts and things.☆13Jan 23, 2026Updated 2 months ago
- Bluff: Interactively Deciphering Adversarial Attacks on Deep Neural Networks☆23May 8, 2023Updated 2 years ago
- ☆18Jun 16, 2023Updated 2 years ago
- ☆16May 20, 2022Updated 3 years ago
- 🤖 A GitHub action that leverages fabric patterns through an agent-based approach☆34Jan 4, 2025Updated last year