The MITRE ATT&CK Mapping Datasets
☆19Jan 23, 2024Updated 2 years ago
Alternatives and similar repositories for mitre-ttp-mapping
Users that are interested in mitre-ttp-mapping are comparing it to the libraries listed below
Sorting:
- Automated Discovery and Mapping ATT&CK Tactics and Techniques for Unstructured Cyber Threat Intelligence☆19Jan 26, 2024Updated 2 years ago
- AnnoCTR corpus for detection and linking of entities in cyber threat reports☆26Apr 12, 2024Updated last year
- TTPDrill focuses on developing automated and context-aware analytics of cyber threat intelligence to accurately learn attack patterns (TT…☆28May 29, 2020Updated 5 years ago
- ☆16Feb 19, 2026Updated last week
- ☆13Aug 19, 2015Updated 10 years ago
- First edition of the annual beginner CTF by havce.☆13Dec 18, 2022Updated 3 years ago
- 一种用于序列标注任务的数据标注(分词,NER)的工具☆11Jun 3, 2020Updated 5 years ago
- Reverse engineering UI for Frida and Android☆16Oct 10, 2023Updated 2 years ago
- DrayTek Vigor password recovery, config & firmware tools☆11Jul 18, 2015Updated 10 years ago
- This is the C version of the StratosphereLinuxIPS. It is mainly used for integration with Snort and other IDSs.☆12Feb 15, 2017Updated 9 years ago
- ☆12Aug 12, 2016Updated 9 years ago
- HTTP host monitoring and management through DNS☆10Aug 31, 2021Updated 4 years ago
- Few-Shot Relation Extraction with AllenNLP☆13Jan 27, 2019Updated 7 years ago
- Get started on the PicoCalc using the Pico-Series C/C++ SDK.☆28Jan 31, 2026Updated last month
- CSS injection requires an attacker to load a standalone CSS file to leak HTML tag attributes.☆20Apr 19, 2024Updated last year
- ☆10Jan 21, 2019Updated 7 years ago
- vncsnapshot☆14Mar 23, 2012Updated 13 years ago
- ☆11May 3, 2019Updated 6 years ago
- pySCM: The Set Covering Machine in Python☆14Apr 18, 2025Updated 10 months ago
- security course list☆14Sep 18, 2015Updated 10 years ago
- Correlate NVD datasets wIth CWE/CAPEC/CVSS labels for customised usage. Plus static analysis and data visualisation.☆13Nov 17, 2023Updated 2 years ago
- Lab Material for the One-Day Web Application Penetration Testing Fundamentals Course☆10Jun 22, 2021Updated 4 years ago
- [ICLR 2025 SCI-FM Workshop] Lemur: Log Parsing with Entropy Sampling and Chain-of-Thought Merging☆13Mar 27, 2025Updated 11 months ago
- 中文实体关系联合抽取baseline☆12Jun 23, 2019Updated 6 years ago
- Contextual Deserialization vulnerability that causes RCE - Remote Code Execution☆14Apr 28, 2024Updated last year
- State of vulnerabilties report☆11Feb 20, 2020Updated 6 years ago
- Backfire helix 3D scaffolds for weather satellites reception☆18Oct 21, 2025Updated 4 months ago
- python日报,每天分 享5篇精选python好文☆10Jun 10, 2020Updated 5 years ago
- The tutorial of "Kubernetes Security for Microservices"☆14Oct 3, 2023Updated 2 years ago
- Network Scanner for OpenSSL Memory Leak (CVE-2014-0160)☆11Sep 24, 2015Updated 10 years ago
- ☆10Sep 7, 2022Updated 3 years ago
- A collection of awesome resources for understanding web caching.☆10Oct 14, 2017Updated 8 years ago
- Flu visualization tool☆10Mar 9, 2017Updated 8 years ago
- This GitHub Action creates a GitHub contribution calendar on a 3D profile image.☆12Nov 10, 2024Updated last year
- Nuclei is a fast tool for configurable targeted vulnerability scanning based on templates offering massive extensibility and ease of use.☆13Aug 4, 2025Updated 6 months ago
- This repository is the tutorial for the IsitObservable Episode on Fluentd☆11May 7, 2025Updated 9 months ago
- Capstone Engine bindings on PHP 7.0+☆12Sep 22, 2022Updated 3 years ago
- CasRelPytorch项目的改写版本,根据源码增添了模型预测功能以及预测结果导入neo4j图数据库的功能。☆13Jul 25, 2024Updated last year
- Đồ án tốt nghiệp TDMU HKII 2019-2020 | Website kiểm trắc nghiệm online☆12Jun 29, 2022Updated 3 years ago