adamstauffer / cyphon
Open source incident management and response platform.
☆12Updated 7 years ago
Alternatives and similar repositories for cyphon:
Users that are interested in cyphon are comparing it to the libraries listed below
- Contextal Platform, a powerful, open-source cybersecurity solution designed for contextual threat detection and intelligence.☆27Updated last week
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆26Updated 2 years ago
- ☆17Updated 3 years ago
- The official Prelude-Correlator GitHub mirror of https://www.prelude-siem.org/projects/prelude-correlator/repository☆10Updated 3 years ago
- OSCAL SSP content for technologies shipped by Red Hat☆15Updated 2 years ago
- Collaborative, web-based case management for incident response☆20Updated last year
- DefectDojo Community Content☆17Updated 5 months ago
- Scripts to deploy and update MISP in air-gapped environments☆17Updated 2 weeks ago
- Osquery Packs we use for customer security hardening☆12Updated 5 months ago
- A generic skeleton project for quickly getting a new cisagov project started.☆15Updated this week
- Documentation used for Shuffle☆19Updated this week
- Open Source runtime scanner for Linux containers (LXD / LXC), It performs security audit checks based on CIS Linux containers Benchmark …☆24Updated 7 months ago
- Active Response plugin. Osquery to execute wazuh/ossec active response plugins. You can write your own plugins, easy to plug☆9Updated 4 years ago
- The NAVV (Network Architecture Verification and Validation) tool creates a spreadsheet for network traffic analysis from PCAP data and Ze…☆30Updated 9 months ago
- experimental threat modeling tools☆14Updated 2 years ago
- Build Automated Machine Images for MISP☆28Updated last year
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Updated 4 years ago
- NIST 800-53 Baseline Configuration Tool☆9Updated 7 months ago
- It's like DocBleach, but in your browser☆18Updated 5 years ago
- Posture Attribute Collection and Evaluation☆23Updated last year
- ☆14Updated last year
- Serverless, real-time, ClamAV+Yara scanning for your S3 Buckets☆31Updated 10 months ago
- D4 core software (server and sample sensor client)☆42Updated last year
- Use SQL to instantly query file, domain, URL and IP scanning results from VirusTotal.☆22Updated 5 months ago
- Lua plugin to extract data from Wireshark and convert it into MISP format☆47Updated last year
- A curated list of Cloud Security techniques and tools☆30Updated last year
- Corelight-Ansible-Roles are a collection of Ansible Roles and playbooks that install, configure, run and manage a variety of Corelight, S…☆16Updated 3 years ago
- Manage, monitor and improve your cyber security posture.☆89Updated last year
- A collection of awesome framework, libraries, documents, learning tutorials, resources about SOC 2 tools and processes.☆23Updated 3 years ago
- Prototype system to monitor BGP routes and alert when anomalies are identified☆14Updated 6 years ago