jgamblin / CVElk
Autoconfigured ELK Stack That Contains All EPSS and NVD CVE Data
☆46Updated 4 months ago
Related projects ⓘ
Alternatives and complementary repositories for CVElk
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆61Updated this week
- An LLM and OCR based Indicator of Compromise Extraction Tool☆31Updated 7 months ago
- MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.☆60Updated 7 months ago
- pocket guide for core detection engineering concepts☆27Updated last year
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆67Updated 6 months ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆57Updated 2 years ago
- ☆41Updated 7 months ago
- CVE.ICU code.☆34Updated this week
- This repository hosts community contributed Kestrel huntflows (.hf) and huntbooks (.ipynb)☆31Updated 10 months ago
- Merge of two major cyber adversary datasets, MITRE ATT&CK and ETDA/ThaiCERT Threat Actor Cards, enabling victim/motivation-adversary-tech…☆50Updated 2 years ago
- Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogue…☆43Updated last month
- Anvilogic Forge☆86Updated last week
- Automatic detection engineering technical state compliance☆50Updated 4 months ago
- Sensor Mappings to ATT&CK is a collection of resources to assist cyber defenders with understanding which sensors and events can help det…☆45Updated 5 months ago
- Summiting the Pyramid is a research project focused on engineering cyber analytics to make adversary evasion more difficult. The research…☆26Updated last month
- Cloud Analytics helps defenders detect attacks to their cloud infrastructure by developing behavioral analytics for cloud platforms as we…☆51Updated last year
- Code and Website For PatchThis.app☆28Updated this week
- ☆37Updated 7 months ago
- ☆33Updated last week
- Public release of Whalehoney Honeypot☆29Updated 2 years ago
- Repository that contains a set of purposefully erroneous Yara rules.☆48Updated 10 months ago
- MITRE Shield website☆18Updated 3 years ago
- Terraform scripts for deploying OpenCTI to AWS, Azure, and GCP☆30Updated 7 months ago
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆84Updated 10 months ago
- A tool that allows you to document and assess any security automation in your SOC☆41Updated 3 weeks ago
- This provides a guided step by step walkthrough for threat modeling with MITRE ATT&CK Framework☆26Updated last year
- A cheatsheet containing AWS CloudTrail events that can be used for Incident Response purposes or Detection Engineering.☆62Updated 6 months ago
- Sharing Threat Hunting runbooks☆24Updated 5 years ago
- ATT&CK Powered Suit is a browser extension that puts the complete MITRE ATT&CK® knowledge base at your fingertips with text search, conte…☆72Updated 2 weeks ago
- ☆19Updated 2 years ago