crond-jaist / CyATP
CyATP: Cybersecurity Awareness Training Platform
☆22Updated 3 years ago
Alternatives and similar repositories for CyATP:
Users that are interested in CyATP are comparing it to the libraries listed below
- This program generates cyber attack scenarios for use in cyber training exercises, red team planning, blue team planning, automated attac…☆26Updated 3 years ago
- Threat Detection Rules (Snort/Sigma/Yara)☆13Updated last year
- Tools used by CSIRT and especially in the scope of CNW☆16Updated 5 months ago
- Log aggregation, analysis, alerting and correlation for Windows, Syslog and text based logs.☆24Updated 8 years ago
- ☆21Updated last year
- Audit Powershell and search from known keywords in history #Blueteam☆25Updated 4 years ago
- Incremental Machine Leaning by example - Detecting suspicious activity in real time with Zeek data streams, River and JA3 hashes☆15Updated 2 years ago
- ☆24Updated 2 years ago
- HoneyDB Python Module☆13Updated last year
- Small web frontend for using openAI's GPT-3.5 and GPT-4's API☆52Updated 6 months ago
- Network Forensic & Anomaly Detection System; tailored for covert channel/network steganography detection☆27Updated 9 months ago
- Deploy an "illegal" SOC to manage vulnerabilities on your city servers in minutes.☆19Updated 2 years ago
- Repository of all the sites related to infosec IP/Domain/Hash/SSL/etc OSINT and eventually will include more.☆66Updated 10 months ago
- Graph Representation of MITRE ATT&CK's CTI data☆48Updated 5 years ago
- The repository contains IOCs in CSV format for APT, Cyber Crimes, Malware and Trojan and whatever I found as part of hunting and research☆12Updated 7 years ago
- SACTI - Securely aggregate CTI sightings and report them on MISP☆13Updated 2 years ago
- vPrioritizer enables us to understand the contextualized risk (vPRisk) on asset-vulnerability relationship level across the organization,…☆68Updated 3 years ago
- The Fastest way to consume Threat Intel☆25Updated 2 years ago
- External twitter feeder for AIL framework☆17Updated last year
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆39Updated last month
- Open YARA scan- and search engine☆19Updated last week
- Threat Mapping Catalogue☆17Updated 3 years ago
- Very basic CLI SIEM (Security Information and Event Management system).☆36Updated 6 years ago
- Automation platform for open source intelligence☆13Updated last year
- Surface Analysis System on Cloud☆19Updated last year
- This script accept a text file and collect any IP address (based on its format x.x.x.x) and check if it is one of Tor exit nodes☆9Updated 4 years ago
- Cybersecurity Incidents Mind Maps☆33Updated 3 years ago
- ☆28Updated last month
- Best practices in threat intelligence☆46Updated 2 years ago
- Simulates a compromise in a cloud and container environment☆32Updated 2 months ago