MISP / SkillAegisLinks
SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in best practices for information management and protective tools. Its gamification system makes learning engaging, ensuring users acquire essential technical skills and adhere to industry standards.
☆30Updated last month
Alternatives and similar repositories for SkillAegis
Users that are interested in SkillAegis are comparing it to the libraries listed below
Sorting:
- Scripts to integrate DFIR-IRIS, MISP and TimeSketch☆34Updated 3 years ago
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.☆51Updated 7 months ago
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆34Updated 2 months ago
- An open source platform to support analysts to organise their case and tasks☆82Updated last week
- Sigma detection rules for hunting with the threathunting-keywords project☆55Updated 3 months ago
- ☆92Updated last month
- simple webapp for converting sigma rules into siem queries using the pySigma library☆49Updated last year
- A web scraper to create MISP events and reports☆16Updated last week
- Repo for experimenting and testing MCP server builds for CTI-related research.☆26Updated last month
- The core backend server handling API requests and task management☆42Updated this week
- VelociraptorMCP is a Model Context Protocol bridge for exposing LLMs to MCP clients.☆36Updated last week
- A package to create HTML MISP reports, including volume of trending events and attributes, evens received from key organisations and targ…☆11Updated this week
- Cumulonimbus-UAL_Extractor is a PowerShell based tool created by the Tesorion CERT team to help gather the Unified Audit Logging out of a…☆20Updated last year
- MasterParser is a simple, all-in-one, digital forensics artifact parser☆23Updated 3 years ago
- Merge of two major cyber adversary datasets, MITRE ATT&CK and ETDA/ThaiCERT Threat Actor Cards, enabling victim/motivation-adversary-tech…☆54Updated 2 years ago
- Library of threat hunts to get any user started!☆44Updated 4 years ago
- Summarize CTI reports with OpenAI☆16Updated this week
- This repository includes a mapping table and a reference process that allows converting between STIX 2.1 Course of Action objects that ma…☆16Updated 2 years ago
- Azure function to insert MISP data in to Azure Sentinel☆32Updated 2 years ago
- Summiting the Pyramid is a research project focused on engineering cyber analytics to make adversary evasion more difficult. The research…☆41Updated last month
- User Feedback Space of #MitreAssistant☆37Updated 2 years ago
- Cyber Threats Detection Rules☆14Updated last month
- Intelligence around common attacker behaviors (MITRE ATT&CK TTPs), in the form of ATT&CK Navigator "layer" json files.☆35Updated 2 years ago
- Cyber Underground General Intelligence Requirements☆93Updated last year
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆96Updated 7 months ago
- Convert Sigma rules to SIEM queries, directly in your browser.☆89Updated this week
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆122Updated last year
- ☆22Updated 9 months ago
- This directory contains presentations and related materials of my speaking engagements. I also use this to record historical presentation…☆17Updated 4 months ago
- Helping Incident Responders hunt for potential persistence mechanisms on UNIX-based systems.☆15Updated last year