adamstauffer / cyphonLinks
Open source incident management and response platform.
☆13Updated 7 years ago
Alternatives and similar repositories for cyphon
Users that are interested in cyphon are comparing it to the libraries listed below
Sorting:
- Manage, monitor and improve your cyber security posture.☆93Updated 2 years ago
- Scripts to deploy and update MISP in air-gapped environments☆17Updated last week
- Active Response plugin. Osquery to execute wazuh/ossec active response plugins. You can write your own plugins, easy to plug☆11Updated 5 years ago
- Corelight-Ansible-Roles are a collection of Ansible Roles and playbooks that install, configure, run and manage a variety of Corelight, S…☆16Updated 4 years ago
- ☆15Updated 2 years ago
- This is the public security policy of CISOfy, with extra resources like security tools.☆92Updated 5 years ago
- A low/zero interaction ssh authentication logging honeypot☆25Updated last week
- D4 core software (server and sample sensor client)☆42Updated 2 years ago
- Pritunl Access Control System☆10Updated 2 years ago
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Updated 5 years ago
- ☆55Updated 3 years ago
- Tool for generating a report from results of oscap scan.☆25Updated last year
- Wazuh - Quality Assurance☆67Updated 2 months ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆29Updated 3 years ago
- Draugnet is a lightweight, open-source tool for anonymous cyber threat reporting. Built for the MISP ecosystem, it lets users submit and …☆20Updated 4 months ago
- CSIRT Tooling: Best Practices in Developing, Maintaining and Distributing Open Source Tools☆16Updated 3 years ago
- Jimi is an automation first no-code platform designed and developed originally for Security Orchestration and Response. Since its launch …☆169Updated last year
- A real-time Grafana dashboard using MISP ZeroMQ message queue and InfluxDB☆18Updated last year
- Falcon Integration Gateway (FIG)☆21Updated 3 weeks ago
- ☁️Haven GRC - easier governance, risk, and compliance 👨⚕️👮♀️🦸♀️🕵️♀️👩🔬☆103Updated 4 years ago
- Osquery Packs we use for customer security hardening☆12Updated 6 months ago
- An open source software directory and release tracker.☆25Updated last week
- Example Suricata rules implementing some of my detection tactics☆22Updated 3 years ago
- grepcidr can be used to filter a list of IP addresses against one or more Classless Inter-Domain Routing (CIDR) specifications, or arbitr…☆37Updated 2 years ago
- rxtls is a hyper-optimized, per-core Certificate Transparency (CT) log processor built for one purpose: to extract and process 100,000+ X…☆55Updated 3 weeks ago
- Posture Attribute Collection and Evaluation☆23Updated 2 years ago
- CERTITUDE - A python package to classify malicious URLs☆20Updated 3 years ago
- Firepit - STIX Columnar Storage☆17Updated last year
- ansible role to setup MISP, Malware Information Sharing Platform & Threat Sharing☆54Updated this week
- Documentation used for Shuffle☆21Updated last week