Skip to content
#

capec

Here are 20 public repositories matching this topic...

"Linking Threat Tactics, Techniques, and Patterns with Defensive Weaknesses, Vulnerabilities and Affected Platform Configurations for Cyber Hunting" by Erik Hemberg, Jonathan Kelly, Michal Shlapentokh-Rothman, Bryn Reinstadler, Katherine Xu, Nick Rutar, Una-May O'Reilly

  • Updated Jul 1, 2024
  • Python

[CYBERSECURITY PROJECT] As an IT student and a cybersecurity thesis assistant in the French laboratory IRISA, I searched how to extract the vulnerability assets from CAPEC. I used R language to do XML extraction and processes of VA extraction. A BASH application has been written and allows to use this tool thanks a command prompt (Linux Distribu…

  • Updated Oct 8, 2020
  • R

Improve this page

Add a description, image, and links to the capec topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the capec topic, visit your repo's landing page and select "manage topics."

Learn more