oasis-tcs / tac-ontologyView external linksLinks
OASIS-TAC-TC: OWL representation of the TAC TCs work products are maintained here. - https://github.com/oasis-tcs/tac-ontology
☆16Oct 27, 2021Updated 4 years ago
Alternatives and similar repositories for tac-ontology
Users that are interested in tac-ontology are comparing it to the libraries listed below
Sorting:
- Unfetter Insight performs natural language processing and analysis for text data to determine and convert to CTI Stix data automatically.☆20Sep 4, 2018Updated 7 years ago
- ☆10Jan 21, 2019Updated 7 years ago
- RENet is a deep learning tensorflow2.0 model for classify ATT&CK techniques and tactics for cyber threat intelligence with relevance enha…☆12Jan 11, 2023Updated 3 years ago
- Repository collecting and automagically processing public threat intelligence reports.☆18May 1, 2020Updated 5 years ago
- Firepit - STIX Columnar Storage☆17Jun 5, 2024Updated last year
- ☆24Dec 10, 2022Updated 3 years ago
- \B\C\M\C\ Open Source Software☆20Jan 3, 2022Updated 4 years ago
- AnnoCTR corpus for detection and linking of entities in cyber threat reports☆26Apr 12, 2024Updated last year
- OASIS Cyber Threat Intelligence (CTI) TC Open Repository: Convert STIX 1.2 XML to STIX 2.x JSON☆52Apr 15, 2024Updated last year
- TTPDrill focuses on developing automated and context-aware analytics of cyber threat intelligence to accurately learn attack patterns (TT…☆28May 29, 2020Updated 5 years ago
- ☆24Aug 15, 2020Updated 5 years ago
- Augmentation to Machine Readable CTI☆37Sep 9, 2025Updated 5 months ago
- attempt to perma root the NEC Terrain android phone☆10Jul 24, 2015Updated 10 years ago
- OASIS Cyber Threat Intelligence (CTI) TC: A tool for generating STIX content for prototyping and testing. https://github.com/oasis-open/c…☆43Apr 15, 2024Updated last year
- database-course☆13Jan 6, 2023Updated 3 years ago
- Lossless image minification using TinyPNG☆10May 25, 2019Updated 6 years ago
- QRadar AQL backend for converting Sigma rules to QRadar AQL queries☆14Sep 18, 2025Updated 5 months ago
- Mock STIX data demonstrating the new data source representation☆16Sep 13, 2023Updated 2 years ago
- The Advanced Vulnerability Information Sharing Environment -- A Platform for CVD and PSIRT Management☆10Jan 30, 2024Updated 2 years ago
- 一种用于序列标注任务的数据标注(分词,NER)的工具☆11Jun 3, 2020Updated 5 years ago
- OASIS Cyber Threat Intelligence (CTI) TC: A repository for commonly used STIX objects in order to avoid needless duplication. https://gi…☆98Jun 4, 2025Updated 8 months ago
- A mirror of the Open Risk white paper collection☆10Nov 11, 2025Updated 3 months ago
- Suricata JSON schema project☆12Jan 5, 2020Updated 6 years ago
- security course list☆14Sep 18, 2015Updated 10 years ago
- @DisCo is a graph based datastore designed to minimize reverse engineering efforts.☆12Jan 21, 2021Updated 5 years ago
- Atomic Red Team Simple Parser☆13Sep 21, 2018Updated 7 years ago
- The Django application powering calltheshots.us☆13May 30, 2022Updated 3 years ago
- Windows privileges add to the complexity of Windows user permissions. Each additional user added to a group could lead to a domain compro…☆10Mar 2, 2018Updated 7 years ago
- This is a mapping of CPEs to package urls created by using VulnerableCode's data☆10Aug 14, 2020Updated 5 years ago
- Make your swine run like it's Divine☆10Mar 14, 2025Updated 11 months ago
- Calculus of Constructions Implementation☆17Dec 20, 2019Updated 6 years ago
- Automatic analysis of SpiderMonkey and Firefox bugs on Bugzilla☆11Feb 5, 2026Updated last week
- Interesting papers☆11Jun 22, 2024Updated last year
- ☆10Dec 28, 2015Updated 10 years ago
- DMD Open-access Variant Explorer (DOVE): A tool to aggregate clinically relevant information related to variants in the DMD gene.☆11Aug 1, 2024Updated last year
- Need to generate a bunch of TileMill projects that are nearly identical and then render them all out? Want to script that? We gotcha cove…☆32Jul 29, 2015Updated 10 years ago
- A set of Protocol Buffers tools and modules for Erlang applications.☆17Aug 18, 2012Updated 13 years ago
- pySCM: The Set Covering Machine in Python☆14Apr 18, 2025Updated 9 months ago
- Implementation of our paper "Injecting Knowledge Base Information into End-to-End Joint Entity and Relation Extraction and Coreference Re…☆10Jan 22, 2022Updated 4 years ago