crond-jaist / CyATPLinks
CyATP: Cybersecurity Awareness Training Platform
☆23Updated 3 years ago
Alternatives and similar repositories for CyATP
Users that are interested in CyATP are comparing it to the libraries listed below
Sorting:
- Log aggregation, analysis, alerting and correlation for Windows, Syslog and text based logs.☆24Updated 8 years ago
- vPrioritizer enables us to understand the contextualized risk (vPRisk) on asset-vulnerability relationship level across the organization,…☆68Updated 3 years ago
- HoneyDB Python Module☆13Updated last year
- Graph Representation of MITRE ATT&CK's CTI data☆48Updated 5 years ago
- This program generates cyber attack scenarios for use in cyber training exercises, red team planning, blue team planning, automated attac…☆27Updated 4 years ago
- The official Prelude-Correlator GitHub mirror of https://www.prelude-siem.org/projects/prelude-correlator/repository☆10Updated 4 years ago
- Very basic CLI SIEM (Security Information and Event Management system).☆39Updated 7 years ago
- Network Forensic & Anomaly Detection System; tailored for covert channel/network steganography detection☆27Updated last year
- This script accept a text file and collect any IP address (based on its format x.x.x.x) and check if it is one of Tor exit nodes☆9Updated 5 years ago
- Simulates a compromise in a cloud and container environment☆32Updated 6 months ago
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout for…☆35Updated 2 years ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Updated 5 years ago
- ☆20Updated last year
- Tools used by CSIRT and especially in the scope of CNW☆16Updated 9 months ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 5 years ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆38Updated 4 months ago
- FIles and guides related to using Elasticstack as a SIEM☆12Updated 5 years ago
- Repository resource threat intelligence for SOC☆10Updated 6 years ago
- Automatic detection engineering technical state compliance☆55Updated 11 months ago
- CyCAT.org taxonomies☆15Updated 4 years ago
- Repository of all the sites related to infosec IP/Domain/Hash/SSL/etc OSINT and eventually will include more.☆66Updated last year
- Following repository contains source codes used in my two Books.☆11Updated 9 years ago
- ☆34Updated 4 years ago
- GRC (Governance, Risk and Compliance) Software, to manage risks and controls. It is based in best practices and helps organizations to ma…☆19Updated 2 years ago
- Yara Scanner For IMAP Feeds and saved Streams☆28Updated 5 years ago
- The official Prelude SIEM GitHub of https://www.prelude-siem.org☆30Updated 9 years ago
- Winterfell hunt is a python script to perform auto threat hunting for malicious activities in windows OS based on collected data by winte…☆15Updated 4 years ago
- Threat Mapping Catalogue☆17Updated 3 years ago
- Cyber Analytics Platform and Examination System (CAPES) Project Page☆14Updated 3 years ago
- DigitalTwinSocCyberrange is a research project by the University of Regensburg and the Ionian University. This prototype aims to provide …☆10Updated 3 years ago