Skip to content
#

threat-data

Here are 4 public repositories matching this topic...

Language: All
Filter by language

"Linking Threat Tactics, Techniques, and Patterns with Defensive Weaknesses, Vulnerabilities and Affected Platform Configurations for Cyber Hunting" by Erik Hemberg, Jonathan Kelly, Michal Shlapentokh-Rothman, Bryn Reinstadler, Katherine Xu, Nick Rutar, Una-May O'Reilly

  • Updated Jul 1, 2024
  • Python

Improve this page

Add a description, image, and links to the threat-data topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the threat-data topic, visit your repo's landing page and select "manage topics."

Learn more