rapticore / ssvc_ore_miner
SSVC Ore Miner - www.rapticore.com
☆9Updated 4 months ago
Alternatives and similar repositories for ssvc_ore_miner:
Users that are interested in ssvc_ore_miner are comparing it to the libraries listed below
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆73Updated 10 months ago
- Stakeholder-Specific Vulnerability Categorization☆140Updated this week
- CISA CSAF Security Advisories☆66Updated this week
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆187Updated this week
- Public static website for the D3FEND project. For the D3FEND ontology repo see: https://github.com/d3fend/d3fend-ontology☆76Updated last month
- Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogue…☆56Updated 3 weeks ago
- This is a repository of vendor-agnostic workflows provided for those interested in deploying Security Orchestration, Automation, and Resp…☆81Updated 4 years ago
- ☆47Updated this week
- 🚨ATTENTION🚨 The CVE mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here as…☆234Updated 11 months ago
- Exploit Prediction Scoring System (EPSS)☆25Updated 2 years ago
- ☆19Updated last month
- OASIS Cyber Threat Intelligence (CTI) TC: A repository for commonly used STIX objects in order to avoid needless duplication. https://gi…☆91Updated this week
- Swagger/ OpenAPI specifications for security products and services☆75Updated last week
- Security Control Knowledge Graph☆28Updated 11 months ago
- A web application for generating, parsing and validating, manipulating, and visualizing CACAO v2.0 playbooks.☆29Updated this week
- Extensible framework for analyzing publicly available information about vulnerabilities☆110Updated last week
- ☆16Updated last year
- Tool to guess CPE name based on common software name☆92Updated 4 months ago
- STIX2 graph visualisation library in JS☆90Updated 2 months ago
- This repository holds the necessary content to produce the D3FEND ontology distribution.☆66Updated this week
- Vulnerability-Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streaml…☆226Updated this week
- The principal objective of this project is to develop a knowledge base of the tactics, techniques, and procedures (TTPs) used by insiders…☆143Updated 6 months ago
- Sensor Mappings to ATT&CK is a collection of resources to assist cyber defenders with understanding which sensors and events can help det…☆49Updated last week
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆170Updated 4 months ago
- KEV EPSS Data☆22Updated this week
- SOARCA - The Open Source CACAO-based Security Orchestrator!☆70Updated this week
- "Linking Threat Tactics, Techniques, and Patterns with Defensive Weaknesses, Vulnerabilities and Affected Platform Configurations for Cyb…☆92Updated 9 months ago
- OWASP Foundation Web Respository☆30Updated 2 years ago
- This project consists of an open source library allowing software to connect to data repositories using STIX Patterning, and return resul…☆241Updated 3 weeks ago
- OASIS TC Open Repository: Lightweight visualization for STIX 2.0 objects and relationships☆147Updated 3 months ago