crond-jaist / CyATP
CyATP: Cybersecurity Awareness Training Platform
☆23Updated 3 years ago
Alternatives and similar repositories for CyATP:
Users that are interested in CyATP are comparing it to the libraries listed below
- This program generates cyber attack scenarios for use in cyber training exercises, red team planning, blue team planning, automated attac…☆26Updated 4 years ago
- HoneyDB Python Module☆13Updated last year
- Log aggregation, analysis, alerting and correlation for Windows, Syslog and text based logs.☆24Updated 8 years ago
- vPrioritizer enables us to understand the contextualized risk (vPRisk) on asset-vulnerability relationship level across the organization,…☆68Updated 3 years ago
- Very basic CLI SIEM (Security Information and Event Management system).☆39Updated 7 years ago
- Graph Representation of MITRE ATT&CK's CTI data☆48Updated 5 years ago
- Windows GUI/Execution Engine for Atomic Red Team Atomics☆34Updated 4 years ago
- Repository of all the sites related to infosec IP/Domain/Hash/SSL/etc OSINT and eventually will include more.☆66Updated last year
- Advanced Persistent Threat Detection Using Network Analysis☆22Updated 6 years ago
- Cybersecurity of Machine Learning and Artificial Intelligence☆71Updated 3 years ago
- Audit Powershell and search from known keywords in history #Blueteam☆25Updated 5 years ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆38Updated 2 months ago
- Next Generation Phishing Tool For Internal / Red Teams☆35Updated 5 years ago
- The repository contains IOCs in CSV format for APT, Cyber Crimes, Malware and Trojan and whatever I found as part of hunting and research☆12Updated 7 years ago
- ☆12Updated 5 years ago
- Incremental Machine Leaning by example - Detecting suspicious activity in real time with Zeek data streams, River and JA3 hashes☆15Updated 2 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 5 years ago
- This tool maps a file's behavior on MITRE ATT&CK matrix.☆58Updated 5 years ago
- Manticore's Public Threats Repository☆10Updated 4 years ago
- The Fastest way to consume Threat Intel☆25Updated 2 years ago
- SilkETW & SilkService☆40Updated 5 years ago
- Automation platform for open source intelligence☆13Updated 2 years ago
- ☆24Updated 2 years ago
- GPT-3 use cases for Cybersecurity☆52Updated last year
- All necessary code in order to feed Sysmon data into Recurrent Neural Network☆17Updated 4 years ago
- ☆22Updated 4 years ago
- ☆44Updated 7 years ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Updated last year
- Threat Mapping Catalogue☆17Updated 3 years ago
- Import Mitre Att&ck into Neo4j database☆35Updated 2 years ago