grapl-security / grapl
Graph platform for Detection and Response
☆692Updated 2 years ago
Alternatives and similar repositories for grapl:
Users that are interested in grapl are comparing it to the libraries listed below
- A repository for using osquery for incident detection and response☆847Updated 2 years ago
- Beagle is an incident response and digital forensics tool which transforms security logs and data into graphs.☆1,303Updated 2 years ago
- Mapping the MITRE ATT&CK Matrix with Osquery☆793Updated last year
- A Linux Auditd rule set mapped to MITRE's Attack Framework☆788Updated 4 years ago
- Extract and aggregate threat intelligence.☆863Updated last year
- The main project for the Unfetter-Discover application. This is the project that will hold the configuration files, the docker-compose f…☆412Updated 2 years ago
- Fast and efficient osquery management☆443Updated 3 weeks ago
- (DEPRECATED) Diffy is a triage tool used during cloud-centric security incidents, to help digital forensics and incident response (DFIR)…☆634Updated last year
- A Python package to interact with the Mitre ATT&CK Framework☆477Updated last year
- Actionable analytics designed to combat threats☆982Updated 2 years ago
- An information security preparedness tool to do adversarial simulation.☆1,122Updated 6 years ago
- Real-time, container-based file scanning at enterprise scale☆919Updated 3 weeks ago
- An analytical framework for network traffic and behavioral analytics☆451Updated 2 years ago
- Chain Reactor is an open source framework for composing executables that simulate adversary behaviors and techniques on Linux endpoints.☆311Updated last month
- The GOSINT framework is a project used for collecting, processing, and exporting high quality indicators of compromise (IOCs).☆544Updated 2 years ago
- File Scanning Framework☆292Updated 3 years ago
- Open Source Security Events Metadata (OSSEM)☆1,265Updated 2 years ago
- A utility to safely generate malicious network traffic patterns and evaluate controls.☆1,306Updated last year
- HASSH is a network fingerprinting standard which can be used to identify specific Client and Server SSH implementations. The fingerprints…☆540Updated last week
- A Splunk app mapped to MITRE ATT&CK to guide your threat hunts☆1,156Updated last year
- Machinae Security Intelligence Collector☆512Updated 11 months ago
- Transform Linux Audit logs for SIEM usage☆763Updated 2 weeks ago
- Detecting ATT&CK techniques & tactics for Linux☆258Updated 4 years ago
- AVML - Acquire Volatile Memory for Linux☆942Updated last week
- This content is analysis and research of the data sources currently listed in ATT&CK.☆409Updated last year
- Documentation of TheHive☆397Updated last year
- Python Script to access ATT&CK content available in STIX via a public TAXII server☆565Updated 4 months ago
- Praetorian's public release of our Metasploit automation of MITRE ATT&CK™ TTPs☆722Updated 5 years ago
- Create actionable data from your Vulnerability Scans☆1,379Updated 2 years ago
- CRITs - Collaborative Research Into Threats☆901Updated 5 years ago