tahti / ADTool2Links
☆50Updated 7 years ago
Alternatives and similar repositories for ADTool2
Users that are interested in ADTool2 are comparing it to the libraries listed below
Sorting:
- CybOX Schemas and Schema Development☆42Updated 8 years ago
- Source for the STIX Documentation site☆45Updated 3 years ago
- The stratosphere testing framework is mean to help in the researching and verification of the behavioral models used by the Stratoshpere …☆50Updated 7 years ago
- IVA is a system to scan for known vulnerabilities in software products installed inside an organization. IVA uses CPE identifiers to sear…☆66Updated 4 years ago
- NCC Group Template for the Microsoft Threat Modeling Tool 2016 for Automotive Security☆47Updated 4 years ago
- Sweet, sweet, secrepo.com html.☆132Updated 3 years ago
- Common Vulnerabilities and Exposures - Portal. Archived and now replaced by vulnerability-lookup.org☆85Updated 2 months ago
- Attack Tree modeling sheet for Dia☆20Updated 6 years ago
- This repository hosts files relating to the TF-CSIRT Reference Security Incident Taxonomy Working Group.☆66Updated 2 months ago
- OASIS OpenC2 TC: Repository for submitting and reviewing OpenC2 use cases relevant to the work of the OpenC2 Language Subcommittee (LSC)☆28Updated 3 years ago
- Potiron - Normalize, Index and Visualize Network Capture☆86Updated 6 years ago
- With the hope that someone finds the data useful, we used to periodically publish an archive of almost all of the non-sensitive vulnerabi…☆93Updated last year
- cve-search is a tool to import CVE (Common Vulnerabilities and Exposures) and CPE (Common Platform Enumeration) into a MongoDB to facilit…☆143Updated last week
- A vulnerability assessment tool for system models☆13Updated 3 years ago
- OWASP Ontology-driven Threat Modelling framework☆37Updated last year
- AMICO - Accurate Behavior-Based Detection of Malware Downloads☆31Updated 7 years ago
- Vulnerability Information Aggregator for CVEs☆120Updated 5 years ago
- OASIS CTI TC: Provides issue tracking and wiki pages for the STIX 2.x Work Products☆26Updated 2 months ago
- A Java library for parsing and programmatically using threat models☆79Updated 2 years ago
- Cyber Intelligence Ontology☆56Updated 8 years ago
- STIX Visualization Tool☆109Updated 6 years ago
- OASIS TC Open Repository: Match STIX content against STIX patterns☆44Updated 2 years ago
- URL Abuse - A Versatile Software for URL review, analysis and black-list reporting☆144Updated 2 years ago
- Creating function call graphs based on radare2 framwork, plot fancy graphs and extract behavior indicators☆31Updated 8 years ago
- cve-search is a tool to import CVE (Common Vulnerabilities and Exposures) and CPE (Common Platform Enumeration) into a MongoDB to facilit…☆25Updated 8 years ago
- Cyber-investigation Analysis Standard Expression (CASE) Ontology☆69Updated last week
- CyRIS: Cyber Range Instantiation System☆101Updated 5 months ago
- A Crowdsourcing Exchange for mapping various sources of security vulnerabilities, exposures, threats, and controls data☆26Updated 6 years ago
- QRadio ~ Best Threat Intelligence Radio ~ Tune In!☆96Updated 9 years ago
- This python scripts can calculate the WHOIS Similarity Distance between two given domains.☆29Updated 2 years ago