Skip to content
OpenCatalogcurated by FLOSSK

Browse & filter

Filter by platform, license text, maturity, maintenance cadence, and editorial tags like privacy-focused or self-hosted. Search matches names, summaries, tags, and use cases.

4 tools match your filters

Outliner + graph PKM with block references and plugin ecosystem.

pkmoutlinergraph

Active Directory attack-path graphing: ingest collectors, map privilege chains, and plan remediations.

pentestactive-directorygraphpurple-team

Open cyber threat intelligence platform with knowledge graph, connectors (MISP, STIX/TAXII), and investigation UI.

threat-intelstixgraphsocself-hosted

Lyft’s tool to sync AWS, GCP, Azure, GitHub, and more into a Neo4j graph for attack-path and permission analysis.

cloudgraphinventoryattack-pathneo4j