mnemonic-no / grafeo
Open platform for modelling, collection and exchange of knowledge
☆157Updated this week
Alternatives and similar repositories for grafeo:
Users that are interested in grafeo are comparing it to the libraries listed below
- Threat Alert Logic Repository☆92Updated 6 years ago
- Collecting & Hunting for IOCs with gusto and style☆236Updated 3 years ago
- A Splunk app to use MISP in background☆109Updated this week
- Tool to extract indicators of compromise from security reports in PDF format☆72Updated 7 months ago
- Log Entry to Sigma Rule Converter☆107Updated 2 years ago
- Threat Feed Aggregation, Made Easy☆167Updated 4 years ago
- ☆116Updated last year
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)☆98Updated last month
- Automated Use Case Testing☆166Updated 6 years ago
- A live dashboard for a real-time overview of threat intelligence from MISP instances☆195Updated last year
- A Splunk App containing Sigma detection rules, which can be updated from a Git repository.☆107Updated 5 years ago
- Mapping NSM rules to MITRE ATT&CK☆69Updated 4 years ago
- Repository of scripts/tools that may be useful in Security Operations Centres (SOC)☆54Updated 4 years ago
- Web app that provides basic navigation and annotation of ATT&CK matrices☆58Updated 5 years ago
- S2AN - Mapper of Sigma/Suricata Rules/Signatures ➡️ MITRE ATT&CK Navigator☆85Updated 2 years ago
- Collection of useful, up to date, Carbon Black Response Queries☆83Updated 4 years ago
- Synapse: a Meta Alert Feeder for TheHive, a Security Incident Response Platform☆71Updated last year
- A tool to assess data quality, built on top of the awesome OSSEM.☆76Updated 2 years ago
- Sigma Detection Rule Repository☆86Updated 4 years ago
- All-in-one bundle of MISP, TheHive and Cortex☆170Updated 2 years ago
- Security Monitoring Resolution Categories☆138Updated 3 years ago
- Personal compilation of APT malware from whitepaper releases, documents and own research☆259Updated 6 years ago
- Tools for the Computer Incident Response Team☆143Updated 7 years ago
- This script scans the files extracted by Zeek with YARA rules located on the rules folder on a Linux based Zeek sensor, if there is a mat…☆61Updated last year
- This program exports MITRE ATT&CK framework in ELK dashboard☆78Updated 2 years ago
- Cloud Templates and scripts to deploy mordor environments☆129Updated 3 years ago
- ☆169Updated 7 months ago
- Set of Maltego transforms to inferface with a MISP Threat Sharing instance, and also to explore the whole MITRE ATT&CK dataset.☆173Updated 7 months ago
- Understanding ATT&CK Matrix for Enterprise☆80Updated 6 years ago
- Data from a BRAWL Automated Adversary Emulation Exercise☆204Updated 4 years ago