cert-lv / graphoscope
Graphoscope is a solution to access multiple independent data sources from a common UI and show data relations as a graph
☆38Updated 4 months ago
Alternatives and similar repositories for graphoscope:
Users that are interested in graphoscope are comparing it to the libraries listed below
- Website crawler with YARA detection☆88Updated last year
- Threat intelligence and threat detection indicators (IOC, IOA)☆52Updated 4 years ago
- Cisco Orbital - Osquery queries by Talos☆132Updated 8 months ago
- Import specific data sources into the Sigma generic and open signature format.☆78Updated 3 years ago
- CyCAT.org API back-end server including crawlers☆29Updated 2 years ago
- Automated deployment of MISP and MISP-Dashboard via K8S and AWS☆19Updated 5 years ago
- Yara-Endpoint is a tool useful for incident response as well as anti-malware enpoint base on Yara signatures.☆109Updated 7 years ago
- Get started using Synapse Open-Source to start a Cortex and perform analysis within your area of expertise.☆42Updated 2 years ago
- A Spicy protocol analyzer for WireGuard☆29Updated 4 years ago
- Converting data from services like Censys and Shodan to a common data model☆49Updated 8 months ago
- Simple yara rule manager☆66Updated 2 years ago
- Cerebrate is an open-source platform meant to act as a trusted contact information provider and interconnection orchestrator for other se…☆88Updated last month
- Harvest Linux forensic data for operational triage of an event.☆51Updated 10 months ago
- Because phishtank was taken.. explore phishing kits in a contained environment!☆47Updated 3 years ago
- Analyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public service - https…☆126Updated last year
- nmap/ndiff based scanner with template based notification system in case of infrastructure changes☆18Updated 7 years ago
- References for FIRST CTI 2019 Symposium presentation☆22Updated 6 years ago
- Automatically create YARA rules from malicious documents.☆211Updated 2 years ago
- Create dataset for suricata with indicators of MISP instances and add sightings in MISP if an indicator of dataset generates an alert☆36Updated 2 years ago
- ☆35Updated 4 years ago
- Specifications used in the MISP project including MISP core format☆51Updated 4 months ago
- Tools related to work with Attack Flow (https://github.com/center-for-threat-informed-defense/attack-flow)☆44Updated 2 years ago
- server for indexing and querying passive DNS observations☆46Updated last month
- Lightweight Python-Based Malware Analysis Pipeline☆34Updated this week
- CSIRT Jump Bag☆26Updated last year
- An open source platform to support analysts to organise their case and tasks☆71Updated last week
- Cont3xt intends to centralize and simplify a structured approach to gathering contextual intelligence in support of technical investigati…☆37Updated last year
- YAFRA is a semi-automated framework for analyzing and representing reports about IT Security incidents.☆27Updated 3 years ago
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆130Updated 3 years ago
- A collection of tips for using MISP.☆74Updated 5 months ago