Base4Security / T3SFLinks
Technical Tabletop Exercises Simulation Framework
☆48Updated last year
Alternatives and similar repositories for T3SF
Users that are interested in T3SF are comparing it to the libraries listed below
Sorting:
- A MITRE ATT&CK Lookup Tool☆45Updated last year
- BlueBox Malware analysis Box and Cyber threat intelligence.☆43Updated 3 years ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆62Updated last year
- Small web frontend for using openAI's GPT-3.5 and GPT-4's API☆57Updated 5 months ago
- Pathfinder is a plugin for mapping network vulnerabilities, scanned by CALDERA or imported by a supported network scanner, and translatin…☆126Updated 5 months ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆35Updated 3 years ago
- Tool for quickly gathering information from Shodan.io about the number of IPs which satisfy large number of different queries☆49Updated 2 years ago
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆40Updated 4 months ago
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆49Updated last year
- ☆44Updated 2 months ago
- simple webapp for converting sigma rules into siem queries using the pySigma library☆51Updated 2 years ago
- Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations☆43Updated 3 years ago
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆114Updated 3 years ago
- Shodan Monitoring integration for TheHive.☆131Updated 9 months ago
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆58Updated 3 years ago
- Intelligence around common attacker behaviors (MITRE ATT&CK TTPs), in the form of ATT&CK Navigator "layer" json files.☆35Updated 3 years ago
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆116Updated last year
- ReWrite of AChoir in Go for Cross Platform☆41Updated 3 weeks ago
- Virtual Security Operations Center☆51Updated 2 years ago
- Domain Response is a tool that is designed to help you automate the investigation for a domain. This tool is specificly designed to autom…☆49Updated 3 weeks ago
- Workflows for Shuffle☆23Updated 2 years ago
- ☆53Updated last month
- A collection of tips for using MISP.☆74Updated 9 months ago
- Penguin OS Forensic (or Flight) Recorder☆40Updated 8 months ago
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆95Updated 4 years ago
- Library of threat hunts to get any user started!☆45Updated 5 years ago
- A toolkit for the post-mortem examination of Docker containers from forensic HDD copies☆105Updated last year
- BlackBerry Threat Research & Intelligence☆99Updated last year
- This directory contains presentations and related materials of my speaking engagements. I also use this to record historical presentation…☆17Updated 7 months ago
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆125Updated last year