cerebrate-project / cerebrateLinks
Cerebrate is an open-source platform meant to act as a trusted contact information provider and interconnection orchestrator for other security tools.
☆88Updated last month
Alternatives and similar repositories for cerebrate
Users that are interested in cerebrate are comparing it to the libraries listed below
Sorting:
- An open source platform to support analysts to organise their case and tasks☆72Updated last week
- Import specific data sources into the Sigma generic and open signature format.☆78Updated 3 years ago
- A collection of tips for using MISP.☆74Updated 5 months ago
- Cleanup of older MISP events can require some work until now☆25Updated 2 years ago
- Incident response teams usually working on the offline data, collecting the evidence, then analyze the data☆45Updated 3 years ago
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆29Updated last month
- Technical add-on for Splunk related to TheHive/Cortex from TheHive project☆53Updated last month
- Create dataset for suricata with indicators of MISP instances and add sightings in MISP if an indicator of dataset generates an alert☆36Updated 2 years ago
- MISP-STIX-Converter - Python library to handle the conversion between MISP and STIX formats☆54Updated this week
- Definition, description and relationship types of MISP objects☆100Updated this week
- Repository for SPEED SIEM Use Case Framework☆54Updated 5 years ago
- ☆34Updated 7 months ago
- SOC Workflow App helps Security Analysts and Threat Hunters explore suspicious events, look into raw events arriving at the Elastic Stack…☆94Updated 2 years ago
- Sigma Detection Rule Repository☆88Updated 4 years ago
- The aim of this repository is to provide a list of examples of tools, sources and measures available to incident response teams☆58Updated 4 years ago
- Open source training materials for law-enforcement and organisations interested in DFIR.☆57Updated this week
- ☆28Updated 4 years ago
- Simple yara rule manager☆66Updated 2 years ago
- A Splunk app to use MISP in background☆110Updated this week
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆122Updated last year
- This repository hosts files relating to the TF-CSIRT Reference Security Incident Taxonomy Working Group.☆66Updated last month
- This repository includes a mapping table and a reference process that allows converting between STIX 2.1 Course of Action objects that ma…☆16Updated 2 years ago
- ☆51Updated 3 years ago
- Tool to extract indicators of compromise from security reports in PDF format☆72Updated 11 months ago
- Website for ail-typo-squatting library☆59Updated last year
- The Intelligent Process Lifecycle of Active Cyber Defenders☆31Updated 2 years ago
- Incident Response Network Tools☆24Updated 3 years ago
- Pulls IOCs from MISP and adds the to reference sets in QRadar☆34Updated 2 years ago
- Creating a Feed of MISP Events from ThreatFox (by abuse.ch)☆19Updated 3 years ago
- The FASTEST way to consume threat intel.☆68Updated 2 years ago