☆19Oct 30, 2020Updated 5 years ago
Alternatives and similar repositories for CICAT
Users that are interested in CICAT are comparing it to the libraries listed below
Sorting:
- ☆12Jan 5, 2021Updated 5 years ago
- Simplified go-cat agent for caldera☆11Dec 18, 2023Updated 2 years ago
- Challenges from past S4 (SCADA Security Scientific Symposium) Capture-the-Flag contests.☆28Aug 19, 2016Updated 9 years ago
- OpenControl Database☆11Jan 5, 2023Updated 3 years ago
- InSpec profile to validate the secure configuration of Red Hat Enterprise Linux 7, against DISA's Red Hat Enterprise Linux 7 Security Tec…☆15Dec 15, 2025Updated 3 months ago
- A Microsoft Threat Modelling tool template for ICS threat modelling☆13Aug 20, 2020Updated 5 years ago
- Landing Page Content/Builder for MITRE Security Automation Framework☆29Mar 1, 2026Updated 3 weeks ago
- Personal repository with handy cheatsheets.☆16Oct 23, 2016Updated 9 years ago
- Taking one back for Steve Irwin (๑•̀ㅂ•́)و☆16Aug 23, 2021Updated 4 years ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Apr 18, 2020Updated 5 years ago
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Apr 10, 2020Updated 5 years ago
- ☆12Jan 14, 2025Updated last year
- NVD API 2.0 for python☆12Sep 26, 2024Updated last year
- Source Code Transparency☆11Sep 25, 2023Updated 2 years ago
- re-hosted web identiy course from opensecuritytraining.info☆11Nov 7, 2025Updated 4 months ago
- PowerShell Utilities for Security Situational Awareness☆13Jan 10, 2017Updated 9 years ago
- Kestrel Jupyter Notebook Kernel☆10Oct 19, 2023Updated 2 years ago
- Sightings Ecosystem gives cyber defenders visibility into what adversaries actually do in the wild. With your help, we are tracking MITRE…☆38May 28, 2025Updated 9 months ago
- A book about how to conduct digital forensic investigations with free and open source tools.☆12Apr 30, 2014Updated 11 years ago
- iOS forensics utility☆13May 8, 2018Updated 7 years ago
- Tools for security content automation, baseline tailoring, and overlay development.☆45Aug 30, 2024Updated last year
- A script to create and assign SOP tasks into the cases☆20Aug 16, 2020Updated 5 years ago
- Zeek BACnet Parser - CISA ICSNPP☆22Nov 6, 2025Updated 4 months ago
- ☆16Feb 15, 2022Updated 4 years ago
- ☆11Feb 25, 2023Updated 3 years ago
- SwaraVM is a mobile security virtual machine that aggregates tools and resources that are commonly used for network traffic analysis, mal…☆32Aug 6, 2019Updated 6 years ago
- Intelligence around common attacker behaviors (MITRE ATT&CK TTPs), in the form of ATT&CK Navigator "layer" json files.☆36Aug 12, 2022Updated 3 years ago
- Verify that systems operate under your sole control☆19Aug 7, 2025Updated 7 months ago
- ☆30Nov 15, 2018Updated 7 years ago
- Scripts to import OSCAL example content into the Neo4J graph database☆34Jan 28, 2023Updated 3 years ago
- Bypass iOS PIN Passcode☆10May 16, 2014Updated 11 years ago
- Automated provisioning of Santoku Linux (configuration of an Ubuntu VM containing the Android development environment, including Android …☆11Mar 4, 2014Updated 12 years ago
- A golang JSON canonicalization scheme library based on RFC 8785☆24Oct 16, 2023Updated 2 years ago
- ☆10Aug 9, 2023Updated 2 years ago
- ☆20Dec 19, 2017Updated 8 years ago
- ☆22Jul 12, 2024Updated last year
- Experimental CPSA -- the Cryptographic Protocol Shapes Analyzer experimental version☆21Mar 2, 2026Updated 2 weeks ago
- Corelight-Ansible-Roles are a collection of Ansible Roles and playbooks that install, configure, run and manage a variety of Corelight, S…☆16Jun 15, 2021Updated 4 years ago
- OSCAL reusable component definitions library☆16Mar 14, 2025Updated last year