-
the result of Full blog post by official demo is too short and meaningless ,how to optimize it
-----
In the fast-paced world of technology, AI continues to make incredible advancements that shape …
-
Over on the repository there is a [Usage.md](https://github.com/mitre/cti/blob/master/USAGE.md#accessing-attck-data-in-python) file that has information on "Accessing ATT&CK data in python". This sec…
-
Integrate an ASM tool into Tracker for: asset discovery, threat/vuln intelligence.
### Must Have
- [x] Permanent connection string setup between ASM and Trackers
### Second Effort (after the connec…
h701h updated
7 months ago
-
**Additional context**
ThreatMapper is missing features used to connect to an open-source Cyber Threat Intelligence Platform, such as OpenCTI. This feature request can be used used to map vulnerabili…
-
-
### Description
Automated Indicator Sharing (AIS) is a service the Cybersecurity and Infrastructure Security Agency (CISA) provides to enable real-time exchange of machine-readable cyber threat indic…
-
**Name of the app**
`ctis-taxii`
(I have opted for hyphenating this app name to make it more readable. CTIS offer other protocols, so I wanted to be as specific as possible)
The name of app you…
-
I downloaded some courses but all of them only had 360p videos. Is there any option to increase the resolution of the videos?
-
The existing Address Object in CybOX is very abstract, and supports the capture of a wide variety of network addresses (IPv4, IPv6, MAC, ATM, Email, etc.). This can cause ambiguity in address expressi…
-
# Trending repositories for C#
1. [**DevToys-app / DevToys**](https://github.com/DevToys-app/DevToys)
__A Swiss Army knife for developers.__
397 stars today | 21,981 star…