23 results for “topic:capec”
The Correlated CVE Vulnerability And Threat Intelligence Database API
Generate MITRE ATT&CK and D3FEND from a list of CVEs. Database with CVE, CWE, CAPEC, MITRE ATT&CK and D3FEND Techniques data is updated daily. Showcased at BlackHat Europe 2025 Arsenal.
Python API for vFeed Vulnerability & Threat Intelligence Database Enterprise & Pro Editions
"Linking Threat Tactics, Techniques, and Patterns with Defensive Weaknesses, Vulnerabilities and Affected Platform Configurations for Cyber Hunting" by Erik Hemberg, Jonathan Kelly, Michal Shlapentokh-Rothman, Bryn Reinstadler, Katherine Xu, Nick Rutar, Una-May O'Reilly
Open Source Tool - Cybersecurity Graph Database in Neo4j
FastCVE: A Dockerized CVE search tool with API and CLI support for security vulnerability queries.
Severity scoring and exploit categorisation for vulnerability reports using machine-learning tools.
Correlate NVD datasets wIth CWE/CAPEC/CVSS labels for customised usage. Plus static analysis and data visualisation.
AutoSecGPT is an AI-power tool that supports security teams to model threats associated with their automotive application to ease the process of conducting TARA.
Security R package with a set of utils to analyse the different industry standards (MITRE and NIST).
Capec interactive visualization using graph database and d3.js rendering library
Neo4j graph for CAPEC data
A small script that creates relationships between common CTI knowledge-bases in STIX 2.1 format.
A multi-label classifier to categorize text in one of the STRIDE categories
A small python script that enriches Vulnerability STIX Objects with other intel
[CYBERSECURITY PROJECT] As an IT student and a cybersecurity thesis assistant in the French laboratory IRISA, I searched how to extract the vulnerability assets from CAPEC. I used R language to do XML extraction and processes of VA extraction. A BASH application has been written and allows to use this tool thanks a command prompt (Linux Distributions only at the moment). A Web application has been written to find some vulnerabilities before this cybersecurity project.
Interactive Editor for creating & annotating enriched Cyber Kill Chains by mapping MITRE ATT&CK, CAPEC, CWE & STIX 2.1 Objects to the Unified Kill Chain framework. Drag-and-drop interface with metadata, confidence scoring, and export capabilities. Track complex kill chains and combine TTPs with atomic IOCs easily.
DetectiveAttacks aims to simplify the process of mitigating cyber attacks directed toward digital infrastructure.
[PoC] Prioritize CWE records according to CAPEC patterns. Mirrored from: https://gitlab.com/seppzer0/atternio
Mirror of MITRE CAPEC
OWL/XML ontology for CAPEC
MITRE to OWL converter
Client-side navigator that maps relationships across CVE, CWE, CAPEC, ATT&CK and D3FEND. Enter any security framework ID and instantly traverse the full chain: from vulnerability to weakness to attack pattern to technique to defense.