Import Mitre Att&ck into Neo4j database
☆39Mar 5, 2026Updated 2 weeks ago
Alternatives and similar repositories for attack2neo
Users that are interested in attack2neo are comparing it to the libraries listed below
Sorting:
- Threat hunting with Sysmon and ArangoDB Graphs☆12Apr 16, 2020Updated 5 years ago
- Graph Representation of MITRE ATT&CK's CTI data☆51Nov 14, 2019Updated 6 years ago
- Threat Mapping Catalogue☆18Aug 10, 2021Updated 4 years ago
- Open Source Tool - Cybersecurity Graph Database in Neo4j☆70Sep 8, 2023Updated 2 years ago
- PowerShell scripts for fast Windows Event Collector configuration with Palantir toolset☆22May 21, 2022Updated 3 years ago
- CLI Search for Security Operators of MITRE ATT&CK URLs☆17Jan 5, 2023Updated 3 years ago
- Advancing TTP Analysis: Harnessing the Power of Large Language Models with Retrieval Augmented Generation☆11May 14, 2024Updated last year
- 威胁检测规则集☆15Jul 5, 2019Updated 6 years ago
- Aggregated ATT&CK technique reporting data. Presented at Splunk GovSummit December 2022☆17Jul 18, 2025Updated 8 months ago
- Utilizing MMF as a execution space for shell code☆10Aug 28, 2018Updated 7 years ago
- This repository contains OpenIOC rules to aid in hunting for indicators of compromise and TTPs focused on Advanced Persistent Threat grou…☆26Oct 3, 2023Updated 2 years ago
- A modern CLI for Tenable.io written in Go☆14Nov 28, 2020Updated 5 years ago
- My experiments in weaponizing Nim (https://nim-lang.org/)☆14Nov 30, 2021Updated 4 years ago
- ☆12Jan 16, 2023Updated 3 years ago
- ProcDot Malware Sandbox☆26Jul 28, 2025Updated 7 months ago
- Machine learning on knowledge graphs for context-aware security monitoring (data and model)☆18Mar 11, 2022Updated 4 years ago
- Command line interface to Carbon Black Response☆38May 12, 2020Updated 5 years ago
- ssdeep cluster analysis for malware files☆31Jun 5, 2020Updated 5 years ago
- PoC that downloads an executable from public DNS servers☆20Jul 19, 2025Updated 8 months ago
- Generate JSON force-directed/ node graph data from MITRE's ATTACK framework and visualize it interactively☆38Apr 19, 2025Updated 11 months ago
- This repo contains the data and codes for the paper submitted to ACM TKDD, titled "A Compact Vulnerability Knowledge Graph for Risk Asses…☆19Mar 8, 2023Updated 3 years ago
- Representation Learning with Ordered Relation Paths for Knowledge Graph Completion (EMNLP 2019)☆11Nov 17, 2019Updated 6 years ago
- Invoke-DetectItEasy is a wrapper for excelent tool called Detect-It-Easy. This PS module is very useful for Threat Hunting and Forensics.☆29Feb 15, 2022Updated 4 years ago
- Alternative password shadowing scheme☆10Feb 22, 2026Updated 3 weeks ago
- ☆39Jul 29, 2021Updated 4 years ago
- Renamed to Free EDR to avoid confusion with Comodo's project☆26May 29, 2023Updated 2 years ago
- Indicators of Compromise (IOCs) accompanying HP Threat Research blog posts and reports.☆29Apr 10, 2024Updated last year
- KG☆14Nov 26, 2022Updated 3 years ago
- Mitre Att&ck Technique Emulation☆82Mar 6, 2019Updated 7 years ago
- ATT&CK技战术数据☆15Feb 8, 2021Updated 5 years ago
- A repository with data about APTs☆13Nov 24, 2022Updated 3 years ago
- Reinforcement learning (RL) is an effective method to find reasoning pathways in incomplete knowledge graphs (KGs). To overcome the chall…☆26Oct 13, 2024Updated last year
- Threat Detection System using Hybrid (Machine Learning + Lexical Analysis) learning Approach.☆11May 30, 2017Updated 8 years ago
- Simple .NET loader for loading and executing Powershell payloads☆17Nov 5, 2021Updated 4 years ago
- Automatic detection engineering technical state compliance☆55Jul 7, 2024Updated last year
- Minimalist Custom .NET Core Garbage Collector☆23Jun 15, 2020Updated 5 years ago
- 🌌 Real-time threat detection for smart contracts☆10May 16, 2023Updated 2 years ago
- The SEPSES Cyber-KB Engine☆27Nov 27, 2024Updated last year
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Jul 5, 2021Updated 4 years ago