crond-jaist / CyATP
CyATP: Cybersecurity Awareness Training Platform
☆23Updated 3 years ago
Alternatives and similar repositories for CyATP
Users that are interested in CyATP are comparing it to the libraries listed below
Sorting:
- Tools used by CSIRT and especially in the scope of CNW☆16Updated 7 months ago
- This program generates cyber attack scenarios for use in cyber training exercises, red team planning, blue team planning, automated attac…☆26Updated 4 years ago
- Log aggregation, analysis, alerting and correlation for Windows, Syslog and text based logs.☆24Updated 8 years ago
- Cybersecurity of Machine Learning and Artificial Intelligence☆73Updated 3 years ago
- The Fastest way to consume Threat Intel☆25Updated 3 years ago
- HoneyDB Python Module☆13Updated last year
- Network Forensic & Anomaly Detection System; tailored for covert channel/network steganography detection☆27Updated last year
- The official Prelude-Correlator GitHub mirror of https://www.prelude-siem.org/projects/prelude-correlator/repository☆10Updated 4 years ago
- ☆24Updated 2 years ago
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆42Updated 2 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 4 years ago
- Advanced Persistent Threat Detection Using Network Analysis☆22Updated 6 years ago
- vPrioritizer enables us to understand the contextualized risk (vPRisk) on asset-vulnerability relationship level across the organization,…☆68Updated 3 years ago
- ☆11Updated 4 years ago
- A collection of awesome software, libraries, documents, books, resources and cool stuff about industrial control systems in cybersecurity…☆33Updated 3 months ago
- Tools related to work with Attack Flow (https://github.com/center-for-threat-informed-defense/attack-flow)☆44Updated 2 years ago
- Small web frontend for using openAI's GPT-3.5 and GPT-4's API☆53Updated last month
- A co-simulation framework for reasearching cybersecurity in power grids.☆22Updated 5 months ago
- Yara Scanner For IMAP Feeds and saved Streams☆28Updated 5 years ago
- GPT-3 use cases for Cybersecurity☆52Updated last year
- CyCAT.org taxonomies☆15Updated 3 years ago
- The repository contains IOCs in CSV format for APT, Cyber Crimes, Malware and Trojan and whatever I found as part of hunting and research☆12Updated 7 years ago
- SACTI - Securely aggregate CTI sightings and report them on MISP☆14Updated 2 years ago
- Python API for vFeed Vulnerability & Threat Intelligence Database Enterprise & Pro Editions☆101Updated last year
- The FastIR Server is a Web server to schedule FastIR Collector forensics collect thanks to the FastIR Agent☆12Updated 8 years ago
- Bunch of honey related items that spoof/decoy powersploit functions.☆18Updated 5 years ago
- This script accept a text file and collect any IP address (based on its format x.x.x.x) and check if it is one of Tor exit nodes☆9Updated 4 years ago
- ☆19Updated last year
- Repository of all the sites related to infosec IP/Domain/Hash/SSL/etc OSINT and eventually will include more.☆66Updated last year
- Graph Representation of MITRE ATT&CK's CTI data☆48Updated 5 years ago