CARET - A tool for viewing cyber analytic relationships
☆27Aug 21, 2020Updated 5 years ago
Alternatives and similar repositories for caret
Users that are interested in caret are comparing it to the libraries listed below
Sorting:
- ATT&CK Evaluations website (DEPRECATED)☆62Apr 30, 2021Updated 4 years ago
- Cyber Analytics Repository☆991May 16, 2025Updated 10 months ago
- Mock STIX data demonstrating the new data source representation☆16Sep 13, 2023Updated 2 years ago
- ☆26Jun 25, 2021Updated 4 years ago
- MITRE ATT&CK Website☆571Updated this week
- Threat Feeds, Threat lists, and regular lists of known IP ranges and domains. It updates every 4 hours.☆16May 21, 2021Updated 4 years ago
- Cuckoo Sandbox is an automated dynamic malware analysis system☆10Sep 11, 2020Updated 5 years ago
- STIX data representing MITRE ATT&CK☆542Dec 23, 2025Updated 2 months ago
- ATT&CK Powered Suit is a browser extension that puts the complete MITRE ATT&CK® knowledge base at your fingertips with text search, conte…☆82Mar 9, 2026Updated last week
- Adapt practically persistence steadiness strategies working at Windows 10 utilized by sponsored nation-state threat actors, as Turla, Pro…☆22Dec 11, 2020Updated 5 years ago
- Collection of exploits that were verified by an automated system☆13Jun 17, 2021Updated 4 years ago
- Joystick is a tool that gives you the ability to transform the ATT&CK Evaluations data into concise views that brings forward the nuances…☆64Sep 13, 2023Updated 2 years ago
- Advanced Persistent Threat Detection Using Network Analysis☆23Feb 28, 2019Updated 7 years ago
- Collector plugin for Graylog☆16Apr 3, 2024Updated last year
- Burp Suite extension to discover assets from HTTP response.☆16May 18, 2021Updated 4 years ago
- Pure Honeypots with an automated bash script☆21Sep 9, 2021Updated 4 years ago
- Maltese - Malware Traffic Emulator☆26Feb 15, 2017Updated 9 years ago
- Scripts and a (future) library to improve users' interactions with the ATT&CK content☆593Dec 11, 2023Updated 2 years ago
- a recon framework that facilitates discovering, scanning and monitoring assets trough a configurable engine running on serverless aws inf…☆12Aug 26, 2024Updated last year
- Documents pertaining to internal policies and guidelines☆12Jan 20, 2017Updated 9 years ago
- CLI tool for graylog-project☆25Mar 11, 2026Updated last week
- Python3 script that can download samples directly from Abuse.CH or via submitted URLs☆15Apr 15, 2020Updated 5 years ago
- Historical Observations of Actionable Reputation Data☆13Jun 26, 2018Updated 7 years ago
- Automatic Sender Policy Framework Reconnaissance☆19Jul 9, 2018Updated 7 years ago
- An OpenAI API Compatible Honeypot Gateway☆17Mar 17, 2025Updated last year
- Sample plugin for Graylog 2.0 including web ui parts.☆10Feb 7, 2024Updated 2 years ago
- Suricata rule and intel index☆33Updated this week
- All in one - Malware + Analysis by Cylance☆11Nov 23, 2018Updated 7 years ago
- A Corpus of Data from Various Cybersecurity Blogs☆15Jun 28, 2022Updated 3 years ago
- An implementation of a device tracking technique based on Algorithm 4 (Double-Hash Port Selection) of RFC 6056.☆16Sep 28, 2022Updated 3 years ago
- Splunk Software Development Kit for PHP☆22Jan 25, 2018Updated 8 years ago
- Scanning Result of MetaScan's AI GPTScan Engine for 13 DefiHacks Projects under 10 Logic Vuln Types☆13Aug 8, 2023Updated 2 years ago
- Code used in analysis and visualisation of IUCN threat maps☆15Aug 26, 2021Updated 4 years ago
- A Splunk technology add-on for osquery☆14Sep 5, 2025Updated 6 months ago
- Can you pay the ransom in your country?☆14Dec 18, 2023Updated 2 years ago
- Another MISP module for Python☆18Feb 17, 2020Updated 6 years ago
- ☆16Feb 15, 2022Updated 4 years ago
- Reproducible and extensible BloodHound playbooks☆44Jan 20, 2020Updated 6 years ago
- OASIS TC Open Repository: GitHub Pages site for STIX and TAXII☆106Mar 10, 2026Updated last week