MISP / SkillAegisLinks
SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in best practices for information management and protective tools. Its gamification system makes learning engaging, ensuring users acquire essential technical skills and adhere to industry standards.
☆30Updated 2 months ago
Alternatives and similar repositories for SkillAegis
Users that are interested in SkillAegis are comparing it to the libraries listed below
Sorting:
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆34Updated 2 months ago
- Cyber Underground General Intelligence Requirements☆94Updated last year
- A collection of tips for using MISP.☆74Updated 7 months ago
- ☆92Updated last month
- Scripts to integrate DFIR-IRIS, MISP and TimeSketch☆34Updated 3 years ago
- An open source platform to support analysts to organise their case and tasks☆87Updated this week
- The core backend server handling API requests and task management☆43Updated 2 weeks ago
- This repository is for Indicators of Compromise (IOCs) from Zscaler ThreatLabz public reports☆73Updated 7 months ago
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.☆51Updated 8 months ago
- Can you pay the ransom in your country?☆14Updated last year
- Azure function to insert MISP data in to Azure Sentinel☆32Updated 2 years ago
- Intel Retrieval Augmented Generation (RAG) Utilities☆90Updated last year
- AIL project training materials☆32Updated last month
- A web scraper to create MISP events and reports☆16Updated last week
- Repo for experimenting and testing MCP server builds for CTI-related research.☆26Updated last month
- BlackBerry Threat Research & Intelligence☆98Updated last year
- Summarize CTI reports with OpenAI☆16Updated last week
- Get started using Synapse Open-Source to start a Cortex and perform analysis within your area of expertise.☆45Updated 3 years ago
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆122Updated last year
- Sigma detection rules for hunting with the threathunting-keywords project☆55Updated 4 months ago
- Library of threat hunts to get any user started!☆44Updated 4 years ago
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆97Updated 8 months ago
- A YARA & Malware Analysis Toolkit written in Rust.☆36Updated this week
- Extracts IoCs, TTPs and the relationships between them. Outputs a STIX 2.1 bundle.☆61Updated this week
- simple webapp for converting sigma rules into siem queries using the pySigma library☆49Updated last year
- A package to create HTML MISP reports, including volume of trending events and attributes, evens received from key organisations and targ…☆11Updated 3 weeks ago
- Offensive Research Guide to Help Defense Improve Detection☆31Updated 2 years ago
- Augmentation to Machine Readable CTI☆31Updated 2 months ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆52Updated 7 months ago
- Practical Information Sharing between Law Enforcement and CSIRT communities using MISP☆33Updated last year