A small script that creates relationships between common CTI knowledge-bases in STIX 2.1 format.
-
Updated
Oct 2, 2024 - Python
A small script that creates relationships between common CTI knowledge-bases in STIX 2.1 format.
DetectiveAttacks aims to simplify the process of mitigating cyber attacks directed toward digital infrastructure.
"Linking Threat Tactics, Techniques, and Patterns with Defensive Weaknesses, Vulnerabilities and Affected Platform Configurations for Cyber Hunting" by Erik Hemberg, Jonathan Kelly, Michal Shlapentokh-Rothman, Bryn Reinstadler, Katherine Xu, Nick Rutar, Una-May O'Reilly
[PoC] Prioritize CWE records according to CAPEC patterns. Mirrored from: https://gitlab.com/seppzer0/atternio
Correlate NVD datasets wIth CWE/CAPEC/CVSS labels for customised usage. Plus static analysis and data visualisation.
Open Source Tool - Cybersecurity Graph Database in Neo4j
A multi-label classifier to categorize text in one of the STRIDE categories
Python API for vFeed Vulnerability & Threat Intelligence Database Enterprise & Pro Editions
Severity scoring and exploit categorisation for vulnerability reports using machine-learning tools.
The Correlated CVE Vulnerability And Threat Intelligence Database API
[CYBERSECURITY PROJECT] As an IT student and a cybersecurity thesis assistant in the French laboratory IRISA, I searched how to extract the vulnerability assets from CAPEC. I used R language to do XML extraction and processes of VA extraction. A BASH application has been written and allows to use this tool thanks a command prompt (Linux Distribu…
Add a description, image, and links to the capec topic page so that developers can more easily learn about it.
To associate your repository with the capec topic, visit your repo's landing page and select "manage topics."