nsacyber / WALKOFFLinks
A flexible, easy to use, automation framework allowing users to integrate their capabilities and devices to cut through the repetitive, tedious tasks slowing them down. #nsacyber
☆1,219Updated 2 years ago
Alternatives and similar repositories for WALKOFF
Users that are interested in WALKOFF are comparing it to the libraries listed below
Sorting:
- The main project for the Unfetter-Discover application. This is the project that will hold the configuration files, the docker-compose f…☆413Updated 2 years ago
- An information security preparedness tool to do adversarial simulation.☆1,123Updated 6 years ago
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆2,133Updated 3 weeks ago
- Beagle is an incident response and digital forensics tool which transforms security logs and data into graphs.☆1,313Updated 2 years ago
- Your Everyday Threat Intelligence☆1,860Updated this week
- Automation and Scaling of Digital Forensics Tools☆767Updated 2 weeks ago
- "Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security …☆1,014Updated 5 years ago
- WALKOFF-enabled applications. #nsacyber☆144Updated 6 years ago
- Retrieves the definitions of Windows Event Log messages embedded in Windows binaries and provides them in discoverable formats. #nsacyber☆402Updated 2 years ago
- Open Source Security Events Metadata (OSSEM)☆1,271Updated 2 years ago
- Cortex: a Powerful Observable Analysis and Active Response Engine☆1,431Updated 7 months ago
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,512Updated 10 months ago
- Automated deployment scripts for the RockNSM network hunting distribution.☆454Updated last year
- Graph platform for Detection and Response☆693Updated 2 years ago
- AIL framework - Analysis Information Leak framework. Project moved to https://github.com/ail-project☆1,330Updated this week
- A repository for using osquery for incident detection and response☆850Updated 2 years ago
- Documentation of TheHive☆397Updated last year
- Create actionable data from your Vulnerability Scans☆1,382Updated 2 years ago
- Real-time, container-based file scanning at enterprise scale☆925Updated 2 weeks ago
- Modular file scanning/analysis framework☆618Updated 5 years ago
- Actionable analytics designed to combat threats☆989Updated 3 years ago
- ☆1,075Updated 6 years ago
- Super timeline all the things☆1,860Updated this week
- Mapping the MITRE ATT&CK Matrix with Osquery☆794Updated 2 years ago
- Configuration files for the SOF-ELK VM☆1,593Updated this week
- Extract and aggregate threat intelligence.☆865Updated last year
- FAME Automates Malware Evaluation☆899Updated last month
- Re-play Security Events☆1,648Updated last year
- Configuration guidance for implementing the Windows 10 and Windows Server 2016 DoD Secure Host Baseline settings. #nsacyber☆1,570Updated 2 years ago
- Web app that provides basic navigation and annotation of ATT&CK matrices☆2,147Updated 2 weeks ago