AustralianCyberSecurityCentre / constellation_cyber_pluginsLinks
The ACSC CyberTools Plugins are build upon the functionality of the Constellation data visualisation platform to deliver enrichments suited the cyber security community
☆24Updated 2 years ago
Alternatives and similar repositories for constellation_cyber_plugins
Users that are interested in constellation_cyber_plugins are comparing it to the libraries listed below
Sorting:
- Import CrowdStrike Threat Intelligence into your instance of MISP☆48Updated 4 months ago
 - Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆49Updated last year
 - Cybersecurity Incident Response Plan☆108Updated 5 years ago
 - an awesome list of active defense resources☆126Updated 5 years ago
 - A SOC Analyst's tool to automate the investigation & validation of possible Indicators of Compromise (IOCs) and perform various tasks inc…☆27Updated 3 years ago
 - A MITRE ATT&CK Lookup Tool☆45Updated last year
 - Resources, tools and utilities about Threat Intelligence☆74Updated 2 years ago
 - Crowdstrike response script containing various functions for IR/triage☆12Updated 4 years ago
 - Table Top Exercise (TTX) for Computer Security Incident Response (CSIRT) teams. The templatized artifacts provided will hopefully help te…☆42Updated 5 years ago
 - A python script to turn Ubuntu Desktop in a one stop security platform. The InfoSec Fortress installs the packages,tools, and resources t…☆54Updated 3 years ago
 - An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆59Updated 3 years ago
 - Collection of Jupyter Notebook for Threat Hunting and Blue Team Purposes☆21Updated 3 years ago
 - A curated list of KAPE-related resources☆175Updated 6 months ago
 - Actionable data for Security Operations☆19Updated 4 years ago
 - ☆48Updated 2 years ago
 - Collects a listing of MITRE ATT&CK Techniques, then discovers Splunk ESCU detections for each technique☆68Updated last year
 - The Infosec Community Definitive Guide to Jupyter Notebooks☆126Updated 5 years ago
 - A series of PowerShell scripts to automate collection of forensic artefacts in most Incident Response environments☆65Updated 3 years ago
 - A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the…☆63Updated 3 years ago
 - Dettectinator - The Python library to your DeTT&CT YAML files.☆117Updated 6 months ago
 - Intelligence around common attacker behaviors (MITRE ATT&CK TTPs), in the form of ATT&CK Navigator "layer" json files.☆35Updated 3 years ago
 - GRC (Governance, Risk and Compliance) Software, to manage risks and controls. It is based in best practices and helps organizations to ma…☆22Updated 2 years ago
 - ☆11Updated 4 years ago
 - Collection of Dashboards for Threat Hunting and more!☆70Updated 5 years ago
 - A collection of dashboards, templates, API's and Power BI code for vulnerability management and analysis☆24Updated 9 months ago
 - Notes on managing and coordinating the response to major cyber incidents☆41Updated 5 years ago
 - A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆101Updated last year
 - Pathfinder is a plugin for mapping network vulnerabilities, scanned by CALDERA or imported by a supported network scanner, and translatin…☆126Updated 7 months ago
 - Search a filesystem for indicators of compromise (IoC).☆81Updated 2 weeks ago
 - ☆73Updated 2 years ago