OASIS-TAC-TC: OWL representation of the TAC TCs work products are maintained here. - https://github.com/oasis-tcs/tac-ontology
☆16Oct 27, 2021Updated 4 years ago
Alternatives and similar repositories for tac-ontology
Users that are interested in tac-ontology are comparing it to the libraries listed below
Sorting:
- Unfetter Insight performs natural language processing and analysis for text data to determine and convert to CTI Stix data automatically.☆20Sep 4, 2018Updated 7 years ago
- ☆10Jan 21, 2019Updated 7 years ago
- RENet is a deep learning tensorflow2.0 model for classify ATT&CK techniques and tactics for cyber threat intelligence with relevance enha…☆12Jan 11, 2023Updated 3 years ago
- stix-icons is a collection of colourful and clean icons for use in software, training and marketing material to visualize cyber threats a…☆38Dec 15, 2022Updated 3 years ago
- OASIS TC Open Repository: STIX Enhancement Proposals (SEPs) https://github.com/oasis-open/cti-sep-repository☆16Jun 15, 2023Updated 2 years ago
- A Corpus of Data from Various Cybersecurity Blogs☆15Jun 28, 2022Updated 3 years ago
- OASIS TC Open Repository: The repository cti-stix-slider supports development of a Python application to convert STIX 2.0 content to STIX…☆22Apr 12, 2024Updated last year
- AnnoCTR corpus for detection and linking of entities in cyber threat reports☆27Apr 12, 2024Updated last year
- The unified ICAS ontology designed to describe information-security related information☆28Feb 6, 2024Updated 2 years ago
- Posture Attribute Collection and Evaluation☆23Jun 20, 2023Updated 2 years ago
- OASIS Cyber Threat Intelligence (CTI) TC Open Repository: Convert STIX 1.2 XML to STIX 2.x JSON☆52Apr 15, 2024Updated last year
- TTPDrill focuses on developing automated and context-aware analytics of cyber threat intelligence to accurately learn attack patterns (TT…☆28May 29, 2020Updated 5 years ago
- ☆24Aug 15, 2020Updated 5 years ago
- ☆41Feb 18, 2026Updated 2 weeks ago
- Django with Data Science [Video], published by Packt☆12Dec 15, 2025Updated 2 months ago
- Augmentation to Machine Readable CTI☆37Sep 9, 2025Updated 6 months ago
- STIX 2.1 Visualizer, Attack and Activity Thread Graph for Threat Modeling☆33Dec 9, 2024Updated last year
- attempt to perma root the NEC Terrain android phone☆10Jul 24, 2015Updated 10 years ago
- Mock STIX data demonstrating the new data source representation☆16Sep 13, 2023Updated 2 years ago
- database-course☆13Jan 6, 2023Updated 3 years ago
- The Advanced Vulnerability Information Sharing Environment -- A Platform for CVD and PSIRT Management☆10Jan 30, 2024Updated 2 years ago
- QRadar AQL backend for converting Sigma rules to QRadar AQL queries☆14Sep 18, 2025Updated 5 months ago
- Exactly what the title says.☆13Feb 2, 2021Updated 5 years ago
- 一种用于序列标注任务的数据标注(分词,NER)的工具☆11Jun 3, 2020Updated 5 years ago
- OASIS Cyber Threat Intelligence (CTI) TC: A repository for commonly used STIX objects in order to avoid needless duplication. https://gi…☆98Jun 4, 2025Updated 9 months ago
- provides a new dataset for NER missions in cyber threat intelligence (CTI) field.☆42Aug 3, 2022Updated 3 years ago
- Suricata JSON schema project☆12Jan 5, 2020Updated 6 years ago
- Atomic Red Team Simple Parser☆13Sep 21, 2018Updated 7 years ago
- ☆10Dec 28, 2015Updated 10 years ago
- Calculus of Constructions Implementation☆17Dec 20, 2019Updated 6 years ago
- Need to generate a bunch of TileMill projects that are nearly identical and then render them all out? Want to script that? We gotcha cove…☆32Jul 29, 2015Updated 10 years ago
- Yara rules☆10Dec 10, 2019Updated 6 years ago
- A mirror of the Open Risk white paper collection☆10Nov 11, 2025Updated 3 months ago
- @DisCo is a graph based datastore designed to minimize reverse engineering efforts.☆12Jan 21, 2021Updated 5 years ago
- pySCM: The Set Covering Machine in Python☆14Apr 18, 2025Updated 10 months ago
- Windows privileges add to the complexity of Windows user permissions. Each additional user added to a group could lead to a domain compro…☆10Mar 2, 2018Updated 8 years ago
- Interesting papers☆11Jun 22, 2024Updated last year
- Automatic analysis of SpiderMonkey and Firefox bugs on Bugzilla☆11Feb 27, 2026Updated last week
- security course list☆14Sep 18, 2015Updated 10 years ago