ail-project / ail-training
AIL project training materials
☆27Updated last month
Alternatives and similar repositories for ail-training:
Users that are interested in ail-training are comparing it to the libraries listed below
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆22Updated 2 months ago
- A MITRE ATT&CK Lookup Tool☆45Updated 9 months ago
- A web scraper to create MISP events and reports☆14Updated last year
- An open source platform to support analysts to organise their case and tasks☆65Updated this week
- DNS Dashboard for hunting and identifying beaconing☆14Updated 4 years ago
- A collection of tips for using MISP.☆74Updated last month
- Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations☆43Updated 3 years ago
- Can you pay the ransom in your country?☆13Updated last year
- Collection of videos of Raids on Cybercriminals☆18Updated 3 months ago
- This script provides a Python library with methods to authenticate to various sources of threat intelligence and query IPs for the latest…☆18Updated 2 years ago
- MasterParser is a simple, all-in-one, digital forensics artifact parser☆23Updated 3 years ago
- Sigma detection rules for hunting with the threathunting-keywords project☆52Updated this week
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆50Updated last month
- Scripts to integrate DFIR-IRIS, MISP and TimeSketch☆33Updated 2 years ago
- Practical Information Sharing between Law Enforcement and CSIRT communities using MISP☆31Updated last year
- Open Threat-Informed Detection Engineering☆32Updated 3 weeks ago
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆69Updated 3 months ago
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆24Updated 3 weeks ago
- CSIRT Jump Bag☆27Updated 9 months ago
- Open-source Fabric templates for cybersecurity and compliance☆15Updated 2 weeks ago
- Learn about a network from a pcap file or reading from an interface☆28Updated 9 months ago
- YARA, SIGMA, SNORT Rules based on Malware Analysis☆16Updated 8 months ago
- Public tools, scripts or code snippets that can help when working with our products☆46Updated last week
- Cyber Underground General Intelligence Requirements☆89Updated 11 months ago
- Cumulonimbus-UAL_Extractor is a PowerShell based tool created by the Tesorion CERT team to help gather the Unified Audit Logging out of a…☆19Updated last year
- Import CrowdStrike Threat Intelligence into your instance of MISP☆42Updated 3 months ago
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆38Updated 9 months ago
- Passive OS detection based on SYN packets without Transmitting any Data☆45Updated last year
- An experimental Velociraptor implementation using cloud infrastructure☆23Updated this week
- Data from Dark Web Marketplace scraping - Be careful☆38Updated 3 months ago