The unified ICAS ontology designed to describe information-security related information
☆28Feb 6, 2024Updated 2 years ago
Alternatives and similar repositories for icas-ontology
Users that are interested in icas-ontology are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Cyber Intelligence Ontology☆56Mar 17, 2017Updated 9 years ago
- version 2 of the Unified Cybersecurity Ontology☆16May 7, 2017Updated 8 years ago
- Extract cyber security entities from unstructured text☆34Apr 24, 2017Updated 8 years ago
- This repository is for development of the Unified Cyber Ontology.☆109Apr 10, 2026Updated last week
- RENet is a deep learning tensorflow2.0 model for classify ATT&CK techniques and tactics for cyber threat intelligence with relevance enha…☆12Jan 11, 2023Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Repository collecting and automagically processing public threat intelligence reports.☆19May 1, 2020Updated 5 years ago
- OASIS-TAC-TC: OWL representation of the TAC TCs work products are maintained here. - https://github.com/oasis-tcs/tac-ontology☆17Oct 27, 2021Updated 4 years ago
- Enables dynamic translation of structured data between formats☆14Dec 14, 2018Updated 7 years ago
- Collection of scanner checks missing in Burp☆15Apr 22, 2022Updated 3 years ago
- ☆25Dec 10, 2022Updated 3 years ago
- Graphics, icons, and diagrams to support STIX 2☆48Jun 2, 2021Updated 4 years ago
- Orange Data Mining Homepage☆17Nov 2, 2019Updated 6 years ago
- 🍊 Data fusion add-on for Orange3☆16Jun 12, 2020Updated 5 years ago
- ☆42Feb 18, 2026Updated 2 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- DRAFT STIX specification documents for version 1.2☆20Oct 3, 2016Updated 9 years ago
- JSON schemas for validating CACAO Security Playbooks. Note: In December 2023, Cyentific AS offered and transferred the content of this re…☆19Dec 15, 2023Updated 2 years ago
- Documentation and Issue Tracking for Stucco☆20Mar 7, 2017Updated 9 years ago
- A program to translate OWL 2 Ontologies to LPG graphs☆13Nov 16, 2022Updated 3 years ago
- TTPDrill focuses on developing automated and context-aware analytics of cyber threat intelligence to accurately learn attack patterns (TT…☆28May 29, 2020Updated 5 years ago
- Maintains backlink structure among interlinked Markdown notes☆11Dec 28, 2020Updated 5 years ago
- Maltego local and server integration for OpenCTI☆31Mar 6, 2026Updated last month
- Liveness monitoring daemon for periodic jobs☆12Apr 13, 2024Updated 2 years ago
- security course list☆14Sep 18, 2015Updated 10 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Unified Cybersecurity Ontology☆110May 6, 2019Updated 6 years ago
- Data for CyberSOCEval, an LLM benchmark by Meta & CrowdStrike☆21Sep 22, 2025Updated 6 months ago
- HECTOR☆20Mar 3, 2017Updated 9 years ago
- An inventory of tools and resources about CyberSecurity that aims to help people to find everything related to CyberSecurity.☆13Jan 5, 2021Updated 5 years ago
- An asynchronous Rust client and server implementation of the Network Block Device (NBD) protocol. MIT Licensed.☆11Jan 24, 2022Updated 4 years ago
- Asset inventory of over 800 public bug bounty programs.☆12Jun 12, 2023Updated 2 years ago
- Few-Shot Relation Extraction with AllenNLP☆12Jan 27, 2019Updated 7 years ago
- ACT documentation repo☆17May 22, 2024Updated last year
- Ransomware Simulator for Red/Blue teams to test their defences.☆20Apr 4, 2022Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- SSD1306 OLED testing with Raspberry Pi Pico and TinyGo☆14Jan 7, 2023Updated 3 years ago
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆43Jan 20, 2026Updated 2 months ago
- Small tools to assist with using Large Language Models☆12Nov 7, 2023Updated 2 years ago
- An HTTP proxy that enables access to Tor Onion Services☆17Dec 16, 2021Updated 4 years ago
- Bridges between Jena and Sesame☆24Dec 16, 2023Updated 2 years ago
- ☆33Oct 27, 2016Updated 9 years ago
- Forked from Akayan. Windows Kernel Exploitation. Static & dynamic analysis, exploits & vuln reasearch. Mitigations bypass's, genric bug-c…☆16Oct 29, 2024Updated last year