ALFA-group/BRON
"Linking Threat Tactics, Techniques, and Patterns with Defensive Weaknesses, Vulnerabilities and Affected Platform Configurations for Cyber Hunting" by Erik Hemberg, Jonathan Kelly, Michal Shlapentokh-Rothman, Bryn Reinstadler, Katherine Xu, Nick Rutar, Una-May O'Reilly
PythonMIT
Stargazers
- 040840308
- Abadacor
- absane
- adulau@MISP @CIRCL @cve-search and many others
- araujofIBM Research
- asaoba
- aslak
- aucampia@Kron-AS
- blackvvineUniversity of Waterloo
- crfrancesco
- f3d3r1c01
- fallstool
- FelisAralis
- franchb
- GitHub-Si
- hrbrmstrGreyNoise Intelligence
- jatrostDatabricks, Inc.
- jenusjju
- joaocmendonca
- liujie40
- mkhlsvn
- myjupyter
- nets4geeks
- nullvoid0x
- onlyonematt
- rtsilva
- sashankhttps://seconize.co/
- seamustuohy
- smolige001
- SteliosZPasiphae Research And Development Lab
- tardifpmVisisyst
- wlmnzfNanjing
- wumingruiye
- xiaoqun-growing
- yangjietadieCoder
- zhaohan-xiBinghamton University