JSON schema representation of Stucco ontology
☆19Apr 14, 2016Updated 10 years ago
Alternatives and similar repositories for ontology
Users that are interested in ontology are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The SEPSES Cyber-KB Engine☆28Nov 27, 2024Updated last year
- Extract relationships between cyber security entities within unstructured text☆24Sep 28, 2018Updated 7 years ago
- Development of the NIST vulnerability data ontology (Vulntology).☆44Nov 10, 2025Updated 5 months ago
- Information Security Knowledge Graph about NVD CAPEC CWE CPE ..☆67May 12, 2020Updated 5 years ago
- MulVAL is an cybersecurity reasoning engine that can be applied on top of multiple contexts (cloud, IoT, enterprise network, etc )☆11Feb 23, 2016Updated 10 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Public Arena dataset☆15Jul 20, 2022Updated 3 years ago
- TTPDrill focuses on developing automated and context-aware analytics of cyber threat intelligence to accurately learn attack patterns (TT…☆28May 29, 2020Updated 5 years ago
- Cyber Range Automated Construction Kit☆15Oct 29, 2020Updated 5 years ago
- Comparing Anomaly-Based Network Intrusion Detection Approaches Under Practical Aspects☆11Mar 25, 2023Updated 3 years ago
- Resources for Code Cafe Online 4th May 2020☆11May 5, 2020Updated 6 years ago
- Extracting Attack Behavior from Threat Reports☆80Apr 28, 2023Updated 3 years ago
- Intrusion Detection System, IDS,Cyberattack Detection,Pytorch,Transformer☆11Oct 17, 2022Updated 3 years ago
- NSL KDD binary classification with Transformer☆10Aug 17, 2020Updated 5 years ago
- ☆87Mar 29, 2023Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- security course list☆14Sep 18, 2015Updated 10 years ago
- Red Team Ethics, resources and more☆17Feb 9, 2020Updated 6 years ago
- Run virtual machines in docker using qemu and practice exploitation techniques overcoming containers limitations.☆15Jan 14, 2021Updated 5 years ago
- Linux group_info refcounter overflow use afer free☆13May 4, 2014Updated 12 years ago
- poc for cve-2017-10661☆12Aug 11, 2017Updated 8 years ago
- Code for EMNLP2017 paper "A Soft-label Method for Noise-tolerant Distantly Supervised Relation Extraction"☆43Apr 17, 2018Updated 8 years ago
- SlackMan - Slackware Package Manager☆10Jan 4, 2019Updated 7 years ago
- Python C2 with JScript Implant☆15Nov 15, 2023Updated 2 years ago
- Minimal and hacky PDF lexer☆10Jun 17, 2015Updated 10 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Nessus Vulnerability Scanner in a Docker container☆10Sep 25, 2018Updated 7 years ago
- KRYSTAL: Knowledge Graph-based Framework for Tactical Attack Discovery in Audit Data☆41Apr 25, 2024Updated 2 years ago
- Unified Cybersecurity Ontology☆110May 6, 2019Updated 7 years ago
- shellinabox for docker based on alpine linux☆12Sep 17, 2021Updated 4 years ago
- Script to enable debug output in the mach_kernel☆26Apr 5, 2016Updated 10 years ago
- Training Vision Transformers from Scratch for Malware Classification☆29Aug 18, 2021Updated 4 years ago
- ☆19Jun 29, 2025Updated 10 months ago
- Public BanditFuzz Repo☆12Jan 12, 2021Updated 5 years ago
- Tornado+Websocket+DockerApi 实现web shell(页面远程操作容器)☆13Sep 12, 2017Updated 8 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- ☆10Sep 10, 2021Updated 4 years ago
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆181Mar 23, 2023Updated 3 years ago
- eAudit suite for recording provenance-related system calls on Linux☆20Jan 16, 2026Updated 3 months ago
- ☆12Feb 22, 2023Updated 3 years ago
- Implementation of our paper "Injecting Knowledge Base Information into End-to-End Joint Entity and Relation Extraction and Coreference Re…☆10Jan 22, 2022Updated 4 years ago
- dbg.vim is vim scipt for debug the program. (support cdb, gdb, jdb,fdb,mdbg)☆35Jul 17, 2015Updated 10 years ago
- A tool to check for rogue/orphaned AWS services running that cost money☆14Dec 21, 2017Updated 8 years ago