The unified ICAS ontology designed to describe information-security related information
☆28Feb 6, 2024Updated 2 years ago
Alternatives and similar repositories for icas-ontology
Users that are interested in icas-ontology are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Cyber Intelligence Ontology☆56Mar 17, 2017Updated 9 years ago
- version 2 of the Unified Cybersecurity Ontology☆16May 7, 2017Updated 8 years ago
- Extract cyber security entities from unstructured text☆34Apr 24, 2017Updated 8 years ago
- Extract relationships between cyber security entities within unstructured text☆24Sep 28, 2018Updated 7 years ago
- Development of the NIST vulnerability data ontology (Vulntology).☆43Nov 10, 2025Updated 4 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆10Jan 21, 2019Updated 7 years ago
- This repository is for development of the Unified Cyber Ontology.☆107Mar 13, 2026Updated 2 weeks ago
- OASIS-TAC-TC: OWL representation of the TAC TCs work products are maintained here. - https://github.com/oasis-tcs/tac-ontology☆16Oct 27, 2021Updated 4 years ago
- Enables dynamic translation of structured data between formats☆14Dec 14, 2018Updated 7 years ago
- AnnoCTR corpus for detection and linking of entities in cyber threat reports☆28Apr 12, 2024Updated last year
- ☆24Dec 10, 2022Updated 3 years ago
- Orange Data Mining Homepage☆17Nov 2, 2019Updated 6 years ago
- The .NET equivalent of Window's rundll.exe/rundll32.exe☆11Oct 24, 2020Updated 5 years ago
- 🍊 Data fusion add-on for Orange3☆16Jun 12, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A pure PowerShell/ .NET DFIR capability that dumps the Windows SRUM (System Resource Usage Monitor) database to CSVs for analysis.☆14Oct 21, 2021Updated 4 years ago
- ☆42Feb 18, 2026Updated last month
- JSON schemas for validating CACAO Security Playbooks. Note: In December 2023, Cyentific AS offered and transferred the content of this re…☆19Dec 15, 2023Updated 2 years ago
- Documentation and Issue Tracking for Stucco☆20Mar 7, 2017Updated 9 years ago
- A program to translate OWL 2 Ontologies to LPG graphs☆13Nov 16, 2022Updated 3 years ago
- TTPDrill focuses on developing automated and context-aware analytics of cyber threat intelligence to accurately learn attack patterns (TT…☆28May 29, 2020Updated 5 years ago
- A Python version of the Blueprints property graph model interface by tinkerpop☆16Updated this week
- ☆24Aug 15, 2020Updated 5 years ago
- Python library for grayhatwarfare.com with small hacks☆16Aug 5, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- security course list☆14Sep 18, 2015Updated 10 years ago
- Unified Cybersecurity Ontology☆109May 6, 2019Updated 6 years ago
- Dell Driver update w/ Powershell Application Deployment ToolKit☆26Jan 26, 2018Updated 8 years ago
- Simple spill-to-disk dictionary☆18May 24, 2016Updated 9 years ago
- HECTOR☆20Mar 3, 2017Updated 9 years ago
- An inventory of tools and resources about CyberSecurity that aims to help people to find everything related to CyberSecurity.☆13Jan 5, 2021Updated 5 years ago
- A docassemble package for case outcome prediction using the analogical reasoning features of openlcbr.☆13Jun 17, 2019Updated 6 years ago
- Implementations and metamodels for SHACL variants☆13Apr 24, 2016Updated 9 years ago
- Few-Shot Relation Extraction with AllenNLP☆12Jan 27, 2019Updated 7 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Open-source implementation of the Action Language for fUML (Alf) specification.☆32Mar 28, 2023Updated 3 years ago
- Ransomware Simulator for Red/Blue teams to test their defences.☆19Apr 4, 2022Updated 3 years ago
- malware-encyclopedias is a set of tools to gather malware names and descriptions☆19May 19, 2016Updated 9 years ago
- SSD1306 OLED testing with Raspberry Pi Pico and TinyGo☆14Jan 7, 2023Updated 3 years ago
- (MIRROR) Deployment and maintenance tool for Cyber Ranges. Core components are salt, openstack, and ceph.☆26Updated this week
- Manu Sporny's genetic information (roughly 1 million SNP markers)☆13Feb 18, 2011Updated 15 years ago
- Project infrastructure for FireHOL☆23Dec 31, 2020Updated 5 years ago