alertflex / cnodeLinks
alertflex controller
☆10Updated 2 months ago
Alternatives and similar repositories for cnode
Users that are interested in cnode are comparing it to the libraries listed below
Sorting:
- Tool to read EVTX files including SYSMON and convert to JSON, MISP Objects and Graph stream☆11Updated 4 years ago
- ☆34Updated 3 years ago
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout for…☆35Updated 2 years ago
- Mapping NSM rules to MITRE ATT&CK☆71Updated 4 years ago
- Threat Mapping Catalogue☆17Updated 3 years ago
- Quickly generate suricata rules for IOCs☆29Updated 4 years ago
- ☆20Updated 5 years ago
- Cybersecurity Incidents Mind Maps☆33Updated 3 years ago
- Remote Desktop Client Fingerprint script for Zeek. Based off of https://github.com/0x4D31/fatt☆39Updated last year
- Links to malware-related YARA rules☆15Updated 2 years ago
- The Fastest way to consume Threat Intel☆25Updated 3 years ago
- SIEM Detection Use Case Library mapped to MITRE ATT&CK tactics and techniques☆12Updated 6 years ago
- A tool to assess data quality, built on top of the awesome OSSEM.☆77Updated 2 years ago
- Python parser for Red Canary's Atomic Red Team Yamls☆27Updated 6 years ago
- CyCAT.org API back-end server including crawlers☆29Updated 2 years ago
- S2AN - Mapper of Sigma/Suricata Rules/Signatures ➡️ MITRE ATT&CK Navigator☆87Updated 2 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 4 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 5 years ago
- Windows GUI/Execution Engine for Atomic Red Team Atomics☆34Updated 5 years ago
- Suricata rule and intel index☆30Updated 2 months ago
- A website and framework for testing NIDS detection☆57Updated 3 years ago
- Hunt for Keywords , Mutex, Windows Event,Registry Keys,Process,Schedule tasks in Windows Machine☆22Updated 5 months ago
- Vulnerability Assessment Module - OpenVas with Elastic stack using VulnWhisperer☆19Updated 5 years ago
- ☆20Updated 4 years ago
- Check IOC provided by a MISP instance on Suricata events☆17Updated 6 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- ☆53Updated 6 years ago
- Website crawler with YARA detection☆88Updated last year
- collector/runner☆65Updated 2 months ago
- Bro analyzer that detects Google's QUIC protocol☆10Updated 4 years ago