QinetiQ-Cyber-Intelligence / OpenCTI-Terraform
A highly available AWS deployment of the Threat Intelligence platform, OpenCTI using Terraform. Native AWS resources are used where feasible.
☆31Updated last year
Alternatives and similar repositories for OpenCTI-Terraform:
Users that are interested in OpenCTI-Terraform are comparing it to the libraries listed below
- Terraform scripts for deploying OpenCTI to AWS, Azure, and GCP☆31Updated last year
- Workflows for Shuffle☆21Updated 2 years ago
- ATT&CK Powered Suit is a browser extension that puts the complete MITRE ATT&CK® knowledge base at your fingertips with text search, conte…☆77Updated 5 months ago
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆26Updated 2 weeks ago
- Threat Simulation Indexes☆38Updated last month
- Small-scale threat emulation and detection range built on Elastic and Atomic Redteam.☆38Updated last year
- User Feedback Space of #MitreAssistant☆37Updated last year
- Convert Sigma rules to LogRhythm searches☆20Updated 3 years ago
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆40Updated 11 months ago
- Collects a listing of MITRE ATT&CK Techniques, then discovers Splunk ESCU detections for each technique☆67Updated last year
- A POC to implement Detection-as-Code with Terraform and Sumo Logic.☆27Updated last year
- MasterParser is a simple, all-in-one, digital forensics artifact parser☆23Updated 3 years ago
- Notes for High Availability MISP in AWS☆19Updated 5 years ago
- Send High & New Incidents to The Hive incident management Platform☆18Updated 4 years ago
- Summiting the Pyramid is a research project focused on engineering cyber analytics to make adversary evasion more difficult. The research…☆37Updated 2 weeks ago
- pocket guide for core detection engineering concepts☆28Updated last year
- Awesome Splunk SPL hunt queries that can be used to detect the latest vulnerability exploitation attempts & subsequent compromise☆61Updated 11 months ago
- ☆15Updated last year
- This repository contains the research and components of our research into using Sigma for AWS Incident Response.☆27Updated last year
- Intelligence around common attacker behaviors (MITRE ATT&CK TTPs), in the form of ATT&CK Navigator "layer" json files.☆35Updated 2 years ago
- Sharing Threat Hunting runbooks☆25Updated 5 years ago
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆55Updated 3 years ago
- Anvilogic Forge☆95Updated this week
- Repository that contains a set of purposefully erroneous Yara rules.☆50Updated last year
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆26Updated 3 weeks ago
- A CALDERA plugin☆76Updated 3 weeks ago
- Attack Tool Timing and Reporting - Structured Attack Logging Format☆21Updated 2 years ago
- Incident response teams usually working on the offline data, collecting the evidence, then analyze the data☆44Updated 3 years ago
- Defending IaaS with ATT&CK is a project to create a collection of ATT&CK techniques relevant to a Linux IaaS environment, as well as a me…☆14Updated last year
- A CALDERA plugin☆26Updated 8 months ago