MISP / SkillAegis
SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in best practices for information management and protective tools. Its gamification system makes learning engaging, ensuring users acquire essential technical skills and adhere to industry standards.
☆27Updated last week
Alternatives and similar repositories for SkillAegis:
Users that are interested in SkillAegis are comparing it to the libraries listed below
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆30Updated 2 weeks ago
- An open source platform to support analysts to organise their case and tasks☆71Updated last week
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.☆51Updated 6 months ago
- ☆87Updated 2 months ago
- Scripts to integrate DFIR-IRIS, MISP and TimeSketch☆34Updated 3 years ago
- The core backend server handling API requests and task management☆38Updated last week
- A collection of tips for using MISP.☆74Updated 4 months ago
- VelociraptorMCP is a Model Context Protocol bridge for exposing LLMs to MCP clients.☆20Updated 3 weeks ago
- Convert Sigma rules to SIEM queries, directly in your browser.☆74Updated this week
- Azure function to insert MISP data in to Azure Sentinel☆32Updated 2 years ago
- Sigma detection rules for hunting with the threathunting-keywords project☆55Updated 2 months ago
- Summarize CTI reports with OpenAI☆16Updated this week
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆88Updated 6 months ago
- This repository includes a mapping table and a reference process that allows converting between STIX 2.1 Course of Action objects that ma…☆16Updated 2 years ago
- Extracts IoCs, TTPs and the relationships between them. Outputs a STIX 2.1 bundle.☆53Updated this week
- Lightweight Python-Based Malware Analysis Pipeline☆34Updated 2 weeks ago
- Cyber Underground General Intelligence Requirements☆92Updated last year
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆120Updated last year
- Augmentation to Machine Readable CTI☆31Updated last month
- Merge of two major cyber adversary datasets, MITRE ATT&CK and ETDA/ThaiCERT Threat Actor Cards, enabling victim/motivation-adversary-tech…☆53Updated 2 years ago
- Logbook for Digital Forensics and Incident Response☆50Updated 9 months ago
- ☆23Updated 8 months ago
- Library of threat hunts to get any user started!☆44Updated 4 years ago
- An experimental script to perform bulk parsing of arbitrary file features with YARA and console logging.☆21Updated 2 years ago
- User Feedback Space of #MitreAssistant☆37Updated last year
- Summiting the Pyramid is a research project focused on engineering cyber analytics to make adversary evasion more difficult. The research…☆38Updated last month
- simple webapp for converting sigma rules into siem queries using the pySigma library☆47Updated last year
- Get started using Synapse Open-Source to start a Cortex and perform analysis within your area of expertise.☆42Updated 2 years ago
- MISP-STIX-Converter - Python library to handle the conversion between MISP and STIX formats☆53Updated last week
- Jupyter Notebooks for Cyber Threat Intelligence☆35Updated last year