JSON schema representation of Stucco ontology
☆19Apr 14, 2016Updated 9 years ago
Alternatives and similar repositories for ontology
Users that are interested in ontology are comparing it to the libraries listed below
Sorting:
- version 2 of the Unified Cybersecurity Ontology☆16May 7, 2017Updated 8 years ago
- The SEPSES Cyber-KB Engine☆27Nov 27, 2024Updated last year
- Extract relationships between cyber security entities within unstructured text☆24Sep 28, 2018Updated 7 years ago
- TTPDrill focuses on developing automated and context-aware analytics of cyber threat intelligence to accurately learn attack patterns (TT…☆28May 29, 2020Updated 5 years ago
- MulVAL is an cybersecurity reasoning engine that can be applied on top of multiple contexts (cloud, IoT, enterprise network, etc )☆11Feb 23, 2016Updated 10 years ago
- Public Arena dataset☆14Jul 20, 2022Updated 3 years ago
- Development of the NIST vulnerability data ontology (Vulntology).☆43Nov 10, 2025Updated 3 months ago
- Cyber Range Automated Construction Kit☆15Oct 29, 2020Updated 5 years ago
- Information Security Knowledge Graph about NVD CAPEC CWE CPE ..☆66May 12, 2020Updated 5 years ago
- A Crowdsourcing Exchange for mapping various sources of security vulnerabilities, exposures, threats, and controls data☆27May 22, 2019Updated 6 years ago
- ☆32Jan 28, 2021Updated 5 years ago
- A non-normative turtle-formatted ontology version of the Activity Streams 2.0 vocabulary☆11Dec 10, 2023Updated 2 years ago
- ☆86Mar 29, 2023Updated 2 years ago
- VLESS-XTLS-uTLS-REALITY setup script.☆10May 3, 2023Updated 2 years ago
- StartLeft is an automation tool for generating Threat Models written in the Open Threat Model (OTM) format from a variety of different so…☆53Updated this week
- 一种用于序列标注任务的数据标注(分词,NER)的工具☆11Jun 3, 2020Updated 5 years ago
- The Software Parts (SParts) lab delivers a Sawtooth-based ledger that provides both accountability and access to the open source componen…☆12Feb 20, 2020Updated 6 years ago
- A Modified gem5 for Simulating Virtualized Systems☆11Mar 1, 2015Updated 11 years ago
- Test cases management system☆15Dec 8, 2022Updated 3 years ago
- Suggest methods for bots used in Trickster Cards.☆10Updated this week
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆182Mar 23, 2023Updated 2 years ago
- This repository is for development of the Unified Cyber Ontology.☆105Feb 17, 2026Updated 2 weeks ago
- Defending IaaS with ATT&CK is a project to create a collection of ATT&CK techniques relevant to a Linux IaaS environment, as well as a me…☆14May 28, 2025Updated 9 months ago
- create concept map from textbook data☆11May 4, 2018Updated 7 years ago
- Implementation of our paper "Injecting Knowledge Base Information into End-to-End Joint Entity and Relation Extraction and Coreference Re…☆10Jan 22, 2022Updated 4 years ago
- Java client for Hawkular☆11Mar 16, 2017Updated 8 years ago
- Measurements and comparisons of nabla containers☆15Feb 20, 2019Updated 7 years ago
- ☆10Jul 8, 2015Updated 10 years ago
- Run virtual machines in docker using qemu and practice exploitation techniques overcoming containers limitations.☆14Jan 14, 2021Updated 5 years ago
- ☆10Jan 21, 2019Updated 7 years ago
- Comparing Anomaly-Based Network Intrusion Detection Approaches Under Practical Aspects☆11Mar 25, 2023Updated 2 years ago
- Few-Shot Relation Extraction with AllenNLP☆12Jan 27, 2019Updated 7 years ago
- An x86-64 instruction decoder.☆16Mar 11, 2024Updated last year
- SlackMan - Slackware Package Manager☆10Jan 4, 2019Updated 7 years ago
- OpenControl Database☆11Jan 5, 2023Updated 3 years ago
- POSIX sh formatter and client for tldr pages☆12Dec 27, 2022Updated 3 years ago
- ☆11Oct 28, 2020Updated 5 years ago
- security course list☆14Sep 18, 2015Updated 10 years ago
- UltimateAndroid is a framework to help developing Android apps in a fast way☆10Nov 23, 2014Updated 11 years ago