Repository for accompanying materials to Threat Knowledge Graphs.
☆18Jul 16, 2025Updated 7 months ago
Alternatives and similar repositories for threat-knowledge-graph
Users that are interested in threat-knowledge-graph are comparing it to the libraries listed below
Sorting:
- Scripts and things.☆13Jan 23, 2026Updated last month
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Aug 18, 2022Updated 3 years ago
- Output Go structure template from JSON structure☆10May 11, 2015Updated 10 years ago
- A list of all known CoDeSys PLCs, along with notes regarding what version, what protocols and ports are used on each.☆14May 5, 2023Updated 2 years ago
- Scanning alive hosts of the given CIDR range in parallel.☆10May 8, 2025Updated 9 months ago
- Docker client library to access the Docker remote API.☆43Sep 18, 2013Updated 12 years ago
- This repository is the tutorial for the IsitObservable Episode on Fluentd☆11May 7, 2025Updated 9 months ago
- ☆23Apr 1, 2025Updated 11 months ago
- Virtual Machine profiler (so far restricted to pypy and cpython)☆10Dec 14, 2014Updated 11 years ago
- ☆21Feb 3, 2019Updated 7 years ago
- Offensive Windows security tooling that allows for persistance to the operating system.☆10Apr 28, 2021Updated 4 years ago
- Dirty Cow implement in Go☆11Nov 3, 2016Updated 9 years ago
- Dictionaries for neocomplete.vim☆12Jan 25, 2018Updated 8 years ago
- Data for CyberSOCEval, an LLM benchmark by Meta & CrowdStrike☆20Sep 22, 2025Updated 5 months ago
- System Call Integrity Layer - experimental security research☆25Jan 31, 2026Updated last month
- まじめなチャット☆20Sep 6, 2014Updated 11 years ago
- ☆13Dec 29, 2020Updated 5 years ago
- A repository of Sysmon For Linux configuration modules☆16Oct 14, 2021Updated 4 years ago
- Activator template for akka-tracing project☆23Jul 18, 2016Updated 9 years ago
- This library provides a simple API client function for DeepL☆15Aug 12, 2020Updated 5 years ago
- Proof of Concept for CVE-2021-1585: Cisco ASA Device Manager RCE☆13Aug 15, 2022Updated 3 years ago
- AI featured threat modeling and security review project☆17Nov 17, 2024Updated last year
- Write Singer data to JSONL files☆15Sep 1, 2023Updated 2 years ago
- Indicators of Normality☆11Jul 22, 2022Updated 3 years ago
- Automated process to build and distribute Posture & Exposure Reports' bi-weekly to customers.☆16Jul 16, 2025Updated 7 months ago
- Ekoparty's BlueSpace Keynote November 2021. Shoutout to @plugxor Muchas Gracias!!!☆13Jun 5, 2023Updated 2 years ago
- This repository contains the list of windows builds as parsable JSON files.☆17Apr 24, 2022Updated 3 years ago
- The MITRE ATT&CK Mapping Datasets☆19Jan 23, 2024Updated 2 years ago
- 鸭鸭咖啡馆主要项目☆16Sep 29, 2022Updated 3 years ago
- Track your beacons in a redteam scoreboard☆16Oct 28, 2020Updated 5 years ago
- The Security Toolkit for managing Generative AI(especially LLMs) and Supervised Learning processes(Learning and Inference).☆22Jun 25, 2025Updated 8 months ago
- ☆19Aug 2, 2020Updated 5 years ago
- Repo of RIT CCDC Team Scripts☆14Mar 28, 2022Updated 3 years ago
- Helpful operator notes and techniques in actionable form☆17Aug 11, 2023Updated 2 years ago
- Custom SOCKS proxy for redteam☆14Mar 29, 2022Updated 3 years ago
- A random color generation site.☆15Mar 15, 2021Updated 4 years ago
- An example of a vulnerable slack bot that runs in AWS lambda.☆19Jul 15, 2017Updated 8 years ago
- various slides and presentations I've worked on☆19Mar 21, 2025Updated 11 months ago