JHUAPL / Low-Regret-MethodologyView external linksLinks
☆30Mar 3, 2021Updated 4 years ago
Alternatives and similar repositories for Low-Regret-Methodology
Users that are interested in Low-Regret-Methodology are comparing it to the libraries listed below
Sorting:
- Tools used by CSIRT and especially in the scope of CNW☆17Jan 14, 2026Updated last month
- AIL project training materials☆39Jul 17, 2025Updated 6 months ago
- The aim of this repository is to provide a list of examples of tools, sources and measures available to incident response teams☆64Jul 15, 2020Updated 5 years ago
- A specialized implementation of the Hierarchical Navigable Small World (HNSW) data structure adapted for efficient nearest neighbor looku…☆10Jan 26, 2026Updated 2 weeks ago
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Dec 10, 2017Updated 8 years ago
- This repository hosts files relating to the TF-CSIRT Reference Security Incident Taxonomy Working Group.☆74Apr 4, 2025Updated 10 months ago
- Home for TRANSITS materials☆25Jul 24, 2024Updated last year
- ☆24Sep 28, 2022Updated 3 years ago
- Command-line tool to search for malware samples in various repositories☆12Mar 3, 2022Updated 3 years ago
- Simple, fast dictionary-based language detector for short texts.☆20Feb 5, 2026Updated last week
- The CRATOS proxy API integrates with your MISP instance and allows to extract indicators that can be consumed by security components such…☆13Sep 21, 2025Updated 4 months ago
- A homebrewed cyber threat intelligence solution☆20Nov 20, 2012Updated 13 years ago
- 🚨ATTENTION🚨 The VERIS mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here …☆72Apr 3, 2024Updated last year
- Augmentation to Machine Readable CTI☆37Sep 9, 2025Updated 5 months ago
- USB HID driver emulation with PID/VID (0x3bca/0x27bb) of Plenom A/S Busylight Alpha, that is supported by Mimikatz. When mimikatz is exec…☆21Sep 6, 2022Updated 3 years ago
- This repository includes a mapping table and a reference process that allows converting between STIX 2.1 Course of Action objects that ma…☆16Aug 24, 2022Updated 3 years ago
- Simplified version of a common crawl fetcher☆17Dec 24, 2025Updated last month
- command line tool to use the DNSDB Flexible Search API extensions.☆16Aug 5, 2024Updated last year
- Checks observables/ioc in TheHive/Cortex against the MISP warningslists☆14Dec 27, 2017Updated 8 years ago
- stix-icons is a collection of colourful and clean icons for use in software, training and marketing material to visualize cyber threats a…☆37Dec 15, 2022Updated 3 years ago
- the fastest way to consume threat intelligence.☆31Mar 9, 2023Updated 2 years ago
- CyCAT.org taxonomies☆15May 22, 2021Updated 4 years ago
- OASIS TC Open Repository: STIX Enhancement Proposals (SEPs) https://github.com/oasis-open/cti-sep-repository☆16Jun 15, 2023Updated 2 years ago
- A multi-threaded scanner that helps identify CORS flaws/misconfigurations☆19Nov 18, 2019Updated 6 years ago
- Open KLara Project☆34Updated this week
- Interface LLMs from within MISP to extract TTPs and threat intel from CTI reports☆18Nov 13, 2023Updated 2 years ago
- Notes on managing and coordinating the response to major cyber incidents☆41May 30, 2020Updated 5 years ago
- Erku is an IPTV and video on demand client for the Roku OS.☆12Dec 29, 2024Updated last year
- DGA Detective - Hunt domains generated by Domain Generation Algorithms to identify malware traffic☆45Aug 3, 2024Updated last year
- Compare multiple log formats against malware reputation lists.☆88Jul 27, 2017Updated 8 years ago
- This is a repository of vendor-agnostic workflows provided for those interested in deploying Security Orchestration, Automation, and Resp…☆90Mar 2, 2021Updated 4 years ago
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆127Dec 5, 2023Updated 2 years ago
- Validates Sigma rules using the JSON schema☆22Mar 18, 2024Updated last year
- Synthetic Adversarial Log Objects: A Framework for synthentic log generation☆86Jan 11, 2024Updated 2 years ago
- An elevated STIX representation of the MITRE ATT&CK Groups knowledge base☆23May 23, 2022Updated 3 years ago
- Email Abuse - A Versatile Software for Email review, analysis and reporting☆21Jul 17, 2015Updated 10 years ago
- Similarius is a Python library to compare web page and evaluate the level of similarity.☆23Dec 2, 2025Updated 2 months ago
- A STIX 2.1 Extension Definition for the Course of Action (COA) object type. The nested property extension allows a COA to share machine-r…☆23Dec 11, 2023Updated 2 years ago
- \B\C\M\C\ Open Source Software☆20Jan 3, 2022Updated 4 years ago