JSON schema representation of Stucco ontology
☆19Apr 14, 2016Updated 9 years ago
Alternatives and similar repositories for ontology
Users that are interested in ontology are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- version 2 of the Unified Cybersecurity Ontology☆16May 7, 2017Updated 8 years ago
- The SEPSES Cyber-KB Engine☆27Nov 27, 2024Updated last year
- Extract relationships between cyber security entities within unstructured text☆24Sep 28, 2018Updated 7 years ago
- Information Security Knowledge Graph about NVD CAPEC CWE CPE ..☆66May 12, 2020Updated 5 years ago
- MulVAL is an cybersecurity reasoning engine that can be applied on top of multiple contexts (cloud, IoT, enterprise network, etc )☆11Feb 23, 2016Updated 10 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Public Arena dataset☆14Jul 20, 2022Updated 3 years ago
- TTPDrill focuses on developing automated and context-aware analytics of cyber threat intelligence to accurately learn attack patterns (TT…☆28May 29, 2020Updated 5 years ago
- A non-normative turtle-formatted ontology version of the Activity Streams 2.0 vocabulary☆11Dec 10, 2023Updated 2 years ago
- Cyber Range Automated Construction Kit☆15Oct 29, 2020Updated 5 years ago
- Resources for Code Cafe Online 4th May 2020☆11May 5, 2020Updated 5 years ago
- Extracting Attack Behavior from Threat Reports☆80Apr 28, 2023Updated 2 years ago
- This repository is for development of the Unified Cyber Ontology.☆107Mar 13, 2026Updated 2 weeks ago
- ☆86Mar 29, 2023Updated 3 years ago
- poc for cve-2017-10661☆12Aug 11, 2017Updated 8 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Code for EMNLP2017 paper "A Soft-label Method for Noise-tolerant Distantly Supervised Relation Extraction"☆43Apr 17, 2018Updated 7 years ago
- Python C2 with JScript Implant☆15Nov 15, 2023Updated 2 years ago
- Minimal and hacky PDF lexer☆10Jun 17, 2015Updated 10 years ago
- Unified Cybersecurity Ontology☆109May 6, 2019Updated 6 years ago
- KRYSTAL: Knowledge Graph-based Framework for Tactical Attack Discovery in Audit Data☆41Apr 25, 2024Updated last year
- shellinabox for docker based on alpine linux☆12Sep 17, 2021Updated 4 years ago
- Script to enable debug output in the mach_kernel☆26Apr 5, 2016Updated 9 years ago
- Training Vision Transformers from Scratch for Malware Classification☆29Aug 18, 2021Updated 4 years ago
- Android attempt at PoC CVE-2016-8655☆13Jul 1, 2017Updated 8 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆19Jun 29, 2025Updated 9 months ago
- Public BanditFuzz Repo☆12Jan 12, 2021Updated 5 years ago
- Using Machine Learning to predict the outcome of a zzuf fuzzing campaign☆23Jun 16, 2015Updated 10 years ago
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆182Mar 23, 2023Updated 3 years ago
- eAudit suite for recording provenance-related system calls on Linux☆20Jan 16, 2026Updated 2 months ago
- ☆12Feb 22, 2023Updated 3 years ago
- Implementation of our paper "Injecting Knowledge Base Information into End-to-End Joint Entity and Relation Extraction and Coreference Re…☆10Jan 22, 2022Updated 4 years ago
- dbg.vim is vim scipt for debug the program. (support cdb, gdb, jdb,fdb,mdbg)☆35Jul 17, 2015Updated 10 years ago
- Linux Kernel module to dump the page tables currently used by the CPU on intel 64bit systems with 4 level paging.☆11Jun 15, 2017Updated 8 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A tool to check for rogue/orphaned AWS services running that cost money☆14Dec 21, 2017Updated 8 years ago
- ☆15Nov 29, 2022Updated 3 years ago
- JoanAudit - A security slicing tool that helps security auditors to perform their security auditing tasks more efficiently☆10Sep 6, 2017Updated 8 years ago
- A vulnerability assessment tool for system models☆13Oct 1, 2021Updated 4 years ago
- ☆10Jan 21, 2019Updated 7 years ago
- python日报,每天分享5篇精选python好文☆10Jun 10, 2020Updated 5 years ago
- Exploitation Training -- CVE-2013-2028: Nginx Stack Based Buffer Overflow☆55Mar 23, 2016Updated 10 years ago