AustralianCyberSecurityCentre / constellation_cyber_pluginsLinks
The ACSC CyberTools Plugins are build upon the functionality of the Constellation data visualisation platform to deliver enrichments suited the cyber security community
☆24Updated 2 years ago
Alternatives and similar repositories for constellation_cyber_plugins
Users that are interested in constellation_cyber_plugins are comparing it to the libraries listed below
Sorting:
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆44Updated last year
- A MITRE ATT&CK Lookup Tool☆45Updated last year
- Resources, tools and utilities about Threat Intelligence☆70Updated 2 years ago
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆35Updated 3 months ago
- Search a filesystem for indicators of compromise (IoC).☆80Updated last week
- Actionable data for Security Operations☆19Updated 3 years ago
- Collects a listing of MITRE ATT&CK Techniques, then discovers Splunk ESCU detections for each technique☆67Updated last year
- Collection of Jupyter Notebook for Threat Hunting and Blue Team Purposes☆20Updated 3 years ago
- Orchestrate gatherer, scanner, saver, and trustymail_reporter☆19Updated 2 months ago
- Import CrowdStrike Threat Intelligence into your instance of MISP☆48Updated 2 months ago
- A collection of tips for using MISP.☆74Updated 8 months ago
- Cybersecurity Incident Response Plan☆91Updated 4 years ago
- Notes on managing and coordinating the response to major cyber incidents☆41Updated 5 years ago
- User Feedback Space of #MitreAssistant☆37Updated 2 years ago
- The Infosec Community Definitive Guide to Jupyter Notebooks☆122Updated 4 years ago
- ATT&CK Powered Suit is a browser extension that puts the complete MITRE ATT&CK® knowledge base at your fingertips with text search, conte…☆78Updated 2 months ago
- Incident Response Plan for all major incidents including cheatsheets for both linux and windows☆14Updated 5 years ago
- ☆11Updated 4 years ago
- Open Threat Hunting Framework☆118Updated 2 years ago
- Intelligence around common attacker behaviors (MITRE ATT&CK TTPs), in the form of ATT&CK Navigator "layer" json files.☆35Updated 3 years ago
- SIEM USE Case Selection Methodology☆16Updated 4 years ago
- Open Source Platform for storing, organizing, and searching documents related to cyber threats☆164Updated last year
- A collection of various SIEM rules relating to malware family groups.☆67Updated last year
- Collection of Dashboards for Threat Hunting and more!☆68Updated 4 years ago
- Domain Response is a tool that is designed to help you automate the investigation for a domain. This tool is specificly designed to autom…☆49Updated last year
- an awesome list of active defense resources☆124Updated 5 years ago
- A GUI to query the API of abuse.ch.☆70Updated 3 years ago
- Cyber Range including Velociraptor + HELK system with a Windows VM for security testing and R&D. Azure and AWS terraform support.☆134Updated 2 years ago
- A curated list of KAPE-related resources☆172Updated 3 months ago
- Cyber Underground General Intelligence Requirements☆94Updated last year