AustralianCyberSecurityCentre / constellation_cyber_pluginsLinks
The ACSC CyberTools Plugins are build upon the functionality of the Constellation data visualisation platform to deliver enrichments suited the cyber security community
☆24Updated 2 years ago
Alternatives and similar repositories for constellation_cyber_plugins
Users that are interested in constellation_cyber_plugins are comparing it to the libraries listed below
Sorting:
- Resources, tools and utilities about Threat Intelligence☆75Updated 2 years ago
- Search a filesystem for indicators of compromise (IoC).☆81Updated last week
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆49Updated last year
- an awesome list of active defense resources☆127Updated 5 years ago
- A python script to turn Ubuntu Desktop in a one stop security platform. The InfoSec Fortress installs the packages,tools, and resources t…☆55Updated 4 years ago
- Submits multiple domains to VirusTotal API☆58Updated 4 years ago
- Cybersecurity Incident Response Plan☆109Updated 5 years ago
- Wrap any binary into a cached webserver☆56Updated 3 years ago
- ☆73Updated 2 years ago
- Collects a listing of MITRE ATT&CK Techniques, then discovers Splunk ESCU detections for each technique☆70Updated last year
- Zerofox Alert Feeder for TheHive, an Open Source and Free Security Incident Response Platform☆45Updated 5 years ago
- Dictionary of CTI-related acronyms, terms, and jargon☆146Updated last month
- Tool for quickly gathering information from Shodan.io about the number of IPs which satisfy large number of different queries☆52Updated 2 years ago
- GUI tool which enables you to parse nessus scan files from Nessus and Tenable.SC by (C) Tenable, Inc. and exports results to a spreadshee…☆108Updated 2 months ago
- SANS Slingshot Linux Distribution☆55Updated 5 years ago
- ☆11Updated 5 years ago
- Intelligence Architecture Mind Map☆141Updated last year
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆41Updated 8 months ago
- A curated list of Awesome Threat Intelligence resources☆50Updated 7 years ago
- A cybersecurity game in Azure Data Explorer☆174Updated last year
- Intelligence around common attacker behaviors (MITRE ATT&CK TTPs), in the form of ATT&CK Navigator "layer" json files.☆35Updated 3 years ago
- BlackBerry Threat Research & Intelligence☆99Updated 2 years ago
- Actionable data for Security Operations☆19Updated 4 years ago
- Cyber Range including Velociraptor + HELK system with a Windows VM for security testing and R&D. Azure and AWS terraform support.☆144Updated 3 years ago
- The Infosec Community Definitive Guide to Jupyter Notebooks☆130Updated 5 years ago
- A MITRE ATT&CK Lookup Tool☆46Updated last year
- Identifies physical locations where a laptop has been based upon wireless profiles and wireless data recorded in event logs☆97Updated 4 years ago
- Visual Studio Code extension for MITRE ATT&CK☆55Updated last year
- Hunting Queries for Microsoft Defender Security Center https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defe…☆39Updated 4 years ago
- A series of PowerShell scripts to automate collection of forensic artefacts in most Incident Response environments☆65Updated 3 years ago