A logic-based enterprise network security analyzer
☆142Jan 28, 2023Updated 3 years ago
Alternatives and similar repositories for mulval
Users that are interested in mulval are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- AutoPentest-DRL: Automated Penetration Testing Using Deep Reinforcement Learning☆429Feb 15, 2022Updated 4 years ago
- BAG-MulVAL: Auxiliary analyzer of intranet security☆21Oct 13, 2023Updated 2 years ago
- Attack graph construction and analysis☆37May 18, 2019Updated 6 years ago
- MulVAL: A logic-based, data-driven enterprise network security analyzer - Originally developed at Kansas State University, updated for Cy…☆37May 13, 2024Updated last year
- An environment for testing AI pentesting agents against a simulated network.☆206Feb 28, 2024Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- The original code for SCARA: Scalable Graph Neural Networks with Feature-Oriented Optimization (VLDB 2022) and Scalable Decoupling Graph …☆13Mar 8, 2024Updated 2 years ago
- Code for "Analyzing the Perceived Severity of Cybersecurity Threats Reported on Social Media".☆25Jul 1, 2019Updated 6 years ago
- Fast and passive subdomain enumeration.☆19Apr 18, 2022Updated 3 years ago
- A Simulated Optimal Intrusion Response Game☆21Apr 3, 2022Updated 3 years ago
- GyoiThon is a growing penetration test tool using Machine Learning.☆18Apr 28, 2020Updated 5 years ago
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆182Mar 23, 2023Updated 3 years ago
- The SEPSES Cyber-KB Engine☆27Nov 27, 2024Updated last year
- Modeling, analyzing and rendering attack trees.☆11Sep 9, 2021Updated 4 years ago
- This repository contains information related to the Root Cause Mapping Working Group and its activities. CVE Numbering Authority (CNA) re…☆16Jan 29, 2025Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Programmatically Interpretable Reinforcement Learning☆22May 20, 2021Updated 4 years ago
- [TDSC 2021] IntruSion alert-driven Attack Graph Extractor. https://ieeexplore.ieee.org/document/9557854☆40Jun 28, 2024Updated last year
- security course list☆14Sep 18, 2015Updated 10 years ago
- code and data for paper "Automatic Generation and Summarization of Shellcode via Transformer and Dual Learning", which accepted in SANER …☆13May 8, 2022Updated 3 years ago
- Source Code Vulnerability Detection Tools(SCVDT)provides a vulnerable code database, vulnerability detection service for Java and C/C++ p…☆117Jun 21, 2021Updated 4 years ago
- Vulnerability knowledge graph construction☆30Dec 24, 2022Updated 3 years ago
- ☆13May 19, 2021Updated 4 years ago
- An ever-growing list of resources for data-driven vulnerability assessment and prioritization☆136Mar 1, 2023Updated 3 years ago
- 🚨ATTENTION🚨 The CVE mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here as…☆240Apr 3, 2024Updated last year
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- ☆11Oct 13, 2020Updated 5 years ago
- A Simple command line tool that helps checking web applications to identify insecure deserialization vulnerabilities.☆24Jul 10, 2019Updated 6 years ago
- Core A2P2V functionality (command line based)☆68May 14, 2024Updated last year
- This is code for finding the minimax/nash/stackelberg strategy of players in Markov Games.☆28Jun 26, 2025Updated 9 months ago
- ☆14Jul 26, 2019Updated 6 years ago
- Automated compromise detection of the world's most popular packages☆16Sep 25, 2023Updated 2 years ago
- ☆39Apr 16, 2018Updated 7 years ago
- A curated list of resources dedicated to reinforcement learning applied to cyber security.☆1,023Feb 6, 2026Updated last month
- "Linking Threat Tactics, Techniques, and Patterns with Defensive Weaknesses, Vulnerabilities and Affected Platform Configurations for Cyb…☆106Nov 9, 2025Updated 4 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- VulExplainer: A Transformer-based Hierarchical Distillation for Explaining Vulnerability Types☆19Nov 24, 2023Updated 2 years ago
- ☆55Nov 15, 2017Updated 8 years ago
- A web-based tool to assist the work of the intuitive threat analysts.☆114Feb 9, 2019Updated 7 years ago
- IoT CVEs as abnormal events to evaluate a real-time host-based IDS. https://doi.org/10.1016/j.future.2022.03.001☆13Mar 16, 2022Updated 4 years ago
- Python framework for manipulating bulk WHOIS data from RIRs☆22Jan 8, 2026Updated 2 months ago
- DiAne is a smart fuzzer for IoT devices☆42Apr 3, 2024Updated last year
- ☆22Jun 1, 2020Updated 5 years ago