There are 1 repository under capec topic.
The Correlated CVE Vulnerability And Threat Intelligence Database API
Generate MITRE ATT&CK and D3FEND from a list of CVEs. Database with CVE, CWE, CAPEC, MITRE ATT&CK and D3FEND Techniques data is updated daily. Showcased at BlackHat Europe 2025 Arsenal.
Python API for vFeed Vulnerability & Threat Intelligence Database Enterprise & Pro Editions
"Linking Threat Tactics, Techniques, and Patterns with Defensive Weaknesses, Vulnerabilities and Affected Platform Configurations for Cyber Hunting" by Erik Hemberg, Jonathan Kelly, Michal Shlapentokh-Rothman, Bryn Reinstadler, Katherine Xu, Nick Rutar, Una-May O'Reilly
Open Source Tool - Cybersecurity Graph Database in Neo4j
FastCVE: A Dockerized CVE search tool with API and CLI support for security vulnerability queries.
Severity scoring and exploit categorisation for vulnerability reports using machine-learning tools.
Correlate NVD datasets wIth CWE/CAPEC/CVSS labels for customised usage. Plus static analysis and data visualisation.
Security R package with a set of utils to analyse the different industry standards (MITRE and NIST).
Capec interactive visualization using graph database and d3.js rendering library
AutoSecGPT is an AI-power tool that supports security teams to model threats associated with their automotive application to ease the process of conducting TARA.
A small script that creates relationships between common CTI knowledge-bases in STIX 2.1 format.
A small python script that enriches Vulnerability STIX Objects with other intel
A multi-label classifier to categorize text in one of the STRIDE categories
[CYBERSECURITY PROJECT] As an IT student and a cybersecurity thesis assistant in the French laboratory IRISA, I searched how to extract the vulnerability assets from CAPEC. I used R language to do XML extraction and processes of VA extraction. A BASH application has been written and allows to use this tool thanks a command prompt (Linux Distributions only at the moment). A Web application has been written to find some vulnerabilities before this cybersecurity project.
DetectiveAttacks aims to simplify the process of mitigating cyber attacks directed toward digital infrastructure.
[PoC] Prioritize CWE records according to CAPEC patterns. Mirrored from: https://gitlab.com/seppzer0/atternio
MITRE to OWL converter
Pink Pandas x Raytheon: Implementing Secure Architecture Assessment and Risk Evaluation with CWEs, CAPECs, and CVEs Workshop