crond-jaist / cyrisLinks
CyRIS: Cyber Range Instantiation System
☆101Updated 6 months ago
Alternatives and similar repositories for cyris
Users that are interested in cyris are comparing it to the libraries listed below
Sorting:
- CASCADE Server☆270Updated 2 years ago
- Dovehawk is a Zeek module that automatically imports MISP indicators and reports Sightings☆122Updated 3 years ago
- Deception based detection techniques mapped to the MITRE’s ATT&CK framework☆289Updated 7 years ago
- Mapping NSM rules to MITRE ATT&CK☆71Updated 4 years ago
- Collecting & Hunting for IOCs with gusto and style☆240Updated 3 years ago
- This repository contains all public indicators identified by 401trg during the course of our investigations. It also includes relevant ya…☆122Updated 4 years ago
- A web-based tool to assist the work of the intuitive threat analysts.☆113Updated 6 years ago
- This program exports MITRE ATT&CK framework in ELK dashboard☆79Updated 2 years ago
- Data from a BRAWL Automated Adversary Emulation Exercise☆207Updated 4 years ago
- This script scans the files extracted by Zeek with YARA rules located on the rules folder on a Linux based Zeek sensor, if there is a mat…☆62Updated last year
- Open platform for modelling, collection and exchange of knowledge☆160Updated last month
- Python API for vFeed Vulnerability & Threat Intelligence Database Enterprise & Pro Editions☆102Updated 2 years ago
- A utility repo to assist with converting between MISP and STIX formats☆68Updated 4 years ago
- a network packet capture compiler☆200Updated 3 years ago
- Automated Use Case Testing☆167Updated 7 years ago
- Detecting ATT&CK techniques & tactics for Linux☆258Updated 4 years ago
- Cuckoo Sandbox plugin for extracts configuration data of known malware☆134Updated last year
- Detecting Lateral Movement with Machine Learning☆137Updated 7 years ago
- A website and framework for testing NIDS detection☆57Updated 3 years ago
- Aktaion is a machine learning open source & active defense (orchestration) prototype. The tool focuses on the detection of exploits based…☆49Updated last year
- pCraft is a PCAP Crafter, which creates a PCAP from an AMI scenario.☆90Updated last year
- A threat hunting / data analysis environment based on Python, Pandas, PySpark and Jupyter Notebook.☆246Updated 3 years ago
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)☆102Updated 2 weeks ago
- Personal compilation of APT malware from whitepaper releases, documents and own research☆260Updated 6 years ago
- Structured Threat Intelligence Graph☆95Updated 2 months ago
- Mitre Att&ck Technique Emulation☆82Updated 6 years ago
- PcapMonkey will provide an easy way to analyze pcap using the latest version of Suricata and Zeek.☆154Updated 3 months ago
- [BHUSA 2018 Arsenal] Integrated tool to analyze Drive-by Download attack☆108Updated 2 years ago
- The stratosphere testing framework is mean to help in the researching and verification of the behavioral models used by the Stratoshpere …☆50Updated 7 years ago
- Wireshark plugin to display Suricata analysis info☆94Updated 3 years ago