crond-jaist / CyATPLinks
CyATP: Cybersecurity Awareness Training Platform
☆23Updated 3 years ago
Alternatives and similar repositories for CyATP
Users that are interested in CyATP are comparing it to the libraries listed below
Sorting:
- This program generates cyber attack scenarios for use in cyber training exercises, red team planning, blue team planning, automated attac…☆30Updated 4 years ago
 - vPrioritizer enables us to understand the contextualized risk (vPRisk) on asset-vulnerability relationship level across the organization,…☆69Updated 3 months ago
 - Graph Representation of MITRE ATT&CK's CTI data☆49Updated 5 years ago
 - Python API for vFeed Vulnerability & Threat Intelligence Database Enterprise & Pro Editions☆102Updated last month
 - HoneyDB Python Module☆14Updated last year
 - Log aggregation, analysis, alerting and correlation for Windows, Syslog and text based logs.☆23Updated 9 years ago
 - Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Updated 5 years ago
 - Simulates a compromise in a cloud and container environment☆32Updated 10 months ago
 - Very basic CLI SIEM (Security Information and Event Management system).☆41Updated 7 years ago
 - Utility for parsing Bro log files into CSV or JSON format☆41Updated 2 years ago
 - This tool maps a file's behavior on MITRE ATT&CK matrix.☆59Updated 5 years ago
 - Compiles a json dataset using public sources that contains properties to aid in the detection and mitigation of over 1000 variants of ran…☆72Updated 2 years ago
 - Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)☆103Updated 3 months ago
 - A few quick recipes for those that do not have much time during the day☆22Updated last year
 - An anomaly-based intrusion detection system.☆86Updated 2 years ago
 - CARET - A tool for viewing cyber analytic relationships☆55Updated 5 years ago
 - Advanced Persistent Threat Detection Using Network Analysis☆22Updated 6 years ago
 - Some YARA rules i will add from time to time☆12Updated 6 years ago
 - Tools used by CSIRT and especially in the scope of CNW☆17Updated 4 months ago
 - Repository of all the sites related to infosec IP/Domain/Hash/SSL/etc OSINT and eventually will include more.☆68Updated this week
 - The repository contains IOCs in CSV format for APT, Cyber Crimes, Malware and Trojan and whatever I found as part of hunting and research☆12Updated 8 years ago
 - Audit Powershell and search from known keywords in history #Blueteam☆25Updated 5 years ago
 - My notes on various topics☆67Updated 2 years ago
 - Cybersecurity of Machine Learning and Artificial Intelligence☆69Updated 3 years ago
 - A curated list of resources to deep dive into the intersection of applied machine learning and threat detection.☆19Updated 5 years ago
 - ATT&CK Evaluations website (DEPRECATED)☆60Updated 4 years ago
 - Scripts to inject demo data and network traffic into an existing Alienvault/OSSIM installation☆21Updated 8 years ago
 - Cyber Analytics Platform and Examination System (CAPES) Project Page☆14Updated 3 years ago
 - OASIS Cyber Threat Intelligence (CTI) TC: A tool for generating STIX content for prototyping and testing. https://github.com/oasis-open/c…☆42Updated last year
 - intrusion detection☆24Updated 8 years ago