Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for security graph
graph
x
security
x
39 search results found
Beagle
⭐
1,171
Beagle is an incident response and digital forensics tool which transforms security logs and data into graphs.
Graph Fraud Detection Papers
⭐
1,148
A curated list of graph-based fraud, anomaly, and outlier detection papers & resources
Awesome Fl
⭐
1,103
Comprehensive and timely academic information on federated learning (papers, frameworks, datasets, tutorials, workshops)
Trevorspray
⭐
877
TREVORspray is a modular password sprayer with threading, clever proxying, loot modules, and more!
Graph Adversarial Learning Literature
⭐
772
A curated list of adversarial attacks and defenses papers on graph-structured data.
Aws Security Viz
⭐
677
Visualize your aws security groups.
Krane
⭐
633
Kubernetes RBAC static analysis & visualisation tool
Dgfraud
⭐
432
A Deep Graph-based Toolbox for Fraud Detection
Starbase
⭐
311
Graph-based security analysis for everyone
Geneweb
⭐
271
GeneWeb is a free (as in free speech) genealogy software with a web interface created by Daniel de Rauglaudre.
Aaia
⭐
252
AWS Identity and Access Management Visualizer and Anomaly Finder
Threatpinchlookup
⭐
236
Documentation and Sharing Repository for ThreatPinch Lookup Chrome & Firefox Extension
Apparatus
⭐
195
A graphical security analysis tool for IoT networks
Security Api Solutions
⭐
193
Microsoft Graph Security API applications and services.
Care Gnn
⭐
127
Code for CIKM 2020 paper Enhancing Graph Neural Network-based Fraud Detectors against Camouflaged Fraudsters
Msgraph Typescript Typings
⭐
103
Microsoft Graph TypeScript Type Definitions
Aws Securitygroup Grapher
⭐
91
This ansible role gets information from an AWS VPC and generate a graphical representation of security groups
Python Security Rest Sample
⭐
73
This sample shows how to connect your Python web app to the Security API using Microsoft Graph.
Aws Visualizer
⭐
70
A visualizer of the network of security group dependencies in an AWS VPC.
Pci
⭐
64
Packet communication investigator
Php Open Graph
⭐
60
This package provides a fluent PHP OOP builder for Open Graph protocol.
Aspnet Security Api Sample
⭐
57
This sample shows how to connect your ASP .Net web app to the Security API using Microsoft Graph SDK.
Secops Automation Examples
⭐
49
Examples on how to maintain security/compliance as code and to automate SecOps using the JupiterOne platform.
Threatreportextractor
⭐
44
Extracting Attack Behavior from Threat Reports
Stixview
⭐
39
STIX2 graph visualisation library in JS
Microsoftgraphsecurity
⭐
33
Unofficial PowerShell module for easy interface with the Microsoft Graph Security APIs.
Ph Commons
⭐
29
Java 11 Library with tons of utility classes required in all projects
Oval Graph
⭐
29
Understand OVAL results in a blink of an eye
Nodestream
⭐
23
A Fast, Declarative, and Extensible ETL Framework for Graph Databases.
Malware
⭐
22
IoT Security Reading List
Discovery
⭐
21
A graphical security analysis tool
Sdk
⭐
21
Home of the JupiterOne SDK
Ms Identity Android Native
⭐
19
[DEPRECATED]An Android app showcasing how to use MSAL to authenticate MSA and Azure AD via the converged v2.0 authentication endpoint, and access the Microsoft Graph with the resulting token.
Jupyter Widget Stixview
⭐
18
STIX2 graph widget for Jupyter notebooks, powered by stixview library
Graph Security Api Auth Sample
⭐
14
[ARCHIVED] Provides sample to retrieve authentication token and send request to Microsoft Graph Security API
Spring Security Acl Neo4j
⭐
10
Supporting Library for Spring Security Acl with Neo4j Graph Database
Mulval
⭐
9
MulVAL is an cybersecurity reasoning engine that can be applied on top of multiple contexts (cloud, IoT, enterprise network, etc )
Jenasecurity
⭐
6
Security (Permissions) wrapper around Jena RDF implementation
Openstack Securitygroup Grapher
⭐
6
This ansible role gets information from an openstack tenant and generate a graphical representation of security groups
Dns Graph
⭐
5
Collection of tools for visualising and correlating DNS data for security use-cases using FDNS data set.
Blauhaunt
⭐
5
A tool collection for filtering and visualizing logon events. Designed to help answering the "Cotton Eye Joe" question (Where did you come from where did you go) in Security Incidents and Threat Hunts
Related Searches
Security Vulnerabilities (11,840)
Laravel Security (11,580)
Php Security (10,611)
Python Graph (6,271)
Javascript Graph (3,671)
Html Security (2,284)
Java Graph (2,154)
C Plus Plus Graph (2,047)
Python Security (1,733)
Algorithms Graph (1,701)
1-39 of 39 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.