KPN-CISO / AttackMatrix
AttackMatrix is a Python module and/or webpage to interact with and explore MITRE's ATT&CK's matrices.
☆17Updated last year
Related projects ⓘ
Alternatives and complementary repositories for AttackMatrix
- CIRCL system forensic tools or a jumble of tools to support forensic☆42Updated last year
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆15Updated 3 years ago
- This repository maintains the SaltStack state files for the REMnux distro.☆39Updated last week
- Core server components for Assemblyline 4 (Alerter, dispatcher, expiry, ingester, scaler, updater, ...)☆19Updated this week
- Zeek package to generate a SMB client fingerprint☆26Updated 4 years ago
- ☆24Updated 2 years ago
- A curses-style interface for automatic takedown notification based on MISP events.☆20Updated 3 years ago
- Dashboards for conducting forensic investigation using windows events in Kibana☆17Updated 5 years ago
- Collection of scripts used to analyse malware or emails☆19Updated 4 years ago
- Open source training materials for law-enforcement and organisations interested in DFIR.☆56Updated 2 months ago
- Pythonic way to work with the galaxies defined there: https://github.com/MISP/misp-galaxy☆19Updated this week
- A collection of typical false positive indicators☆54Updated 3 years ago
- Threat Box Assessment Tool☆19Updated 3 years ago
- References for FIRST CTI 2019 Symposium presentation☆23Updated 5 years ago
- Site for IWS book content☆18Updated 6 years ago
- CyCAT.org API back-end server including crawlers☆30Updated last year
- Validates yara rules and tries to repair the broken ones.☆39Updated 4 years ago
- Converting data from services like Censys and Shodan to a common data model☆48Updated 2 months ago
- Mass Triage Tools☆20Updated 4 months ago
- Defensomania is a security monitoring and incident response card game.☆60Updated last year
- Connect your mail client/infrastructure to MISP in order to create events based on the information contained within mails.☆69Updated last year
- Data related to the SANS Internet Storm Center☆11Updated 5 years ago
- Randori: Like Aiki. With a couple of Dans under its belt.☆14Updated 7 years ago
- CSIRT Jump Bag☆27Updated 6 months ago
- A script to assist in processing forensic RAM captures for malware triage☆27Updated 3 years ago
- Different DFIR and CTI utilities☆36Updated 4 years ago
- ☆17Updated 5 years ago
- Use DNS to hunt for threats including DGAs☆14Updated 8 years ago
- Threat intelligence and threat detection indicators (IOC, IOA)☆53Updated 3 years ago