nsacyber / WALKOFF
A flexible, easy to use, automation framework allowing users to integrate their capabilities and devices to cut through the repetitive, tedious tasks slowing them down. #nsacyber
☆1,215Updated 2 years ago
Alternatives and similar repositories for WALKOFF:
Users that are interested in WALKOFF are comparing it to the libraries listed below
- The main project for the Unfetter-Discover application. This is the project that will hold the configuration files, the docker-compose f…☆412Updated 2 years ago
- Retrieves the definitions of Windows Event Log messages embedded in Windows binaries and provides them in discoverable formats. #nsacyber☆401Updated 2 years ago
- WALKOFF-enabled applications. #nsacyber☆143Updated 6 years ago
- NSA Cybersecurity. Formerly known as NSA Information Assurance and the Information Assurance Directorate☆271Updated 7 months ago
- Beagle is an incident response and digital forensics tool which transforms security logs and data into graphs.☆1,287Updated 2 years ago
- Automation and Scaling of Digital Forensics Tools☆760Updated 3 weeks ago
- Configuration guidance for implementing the Windows 10 and Windows Server 2016 DoD Secure Host Baseline settings. #nsacyber☆1,565Updated 2 years ago
- Modular file scanning/analysis framework☆618Updated 5 years ago
- FAME Automates Malware Evaluation☆882Updated last month
- Your Everyday Threat Intelligence☆1,835Updated last week
- An information security preparedness tool to do adversarial simulation.☆1,118Updated 5 years ago
- A repository for using osquery for incident detection and response☆842Updated 2 years ago
- An open source framework for enterprise level automated analysis.☆395Updated 2 years ago
- "Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security …☆1,011Updated 4 years ago
- Laika BOSS: Object Scanning System☆746Updated 3 months ago
- Extract and aggregate threat intelligence.☆852Updated last year
- Documentation of TheHive☆396Updated last year
- Praetorian's public release of our Metasploit automation of MITRE ATT&CK™ TTPs☆721Updated 5 years ago
- File Scanning Framework☆292Updated 3 years ago
- Cyber Threat Intelligence Repository expressed in STIX 2.0☆1,820Updated 4 months ago
- DPS' Lightweight Investigation Notebook☆427Updated last year
- The GOSINT framework is a project used for collecting, processing, and exporting high quality indicators of compromise (IOCs).☆544Updated last year
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,510Updated 8 months ago
- Kaspersky's GReAT KLara☆707Updated 8 months ago
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,266Updated 2 months ago
- Incident Response Forensic Framework☆599Updated 5 years ago
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆2,079Updated last week
- An analytical framework for network traffic and behavioral analytics☆450Updated 2 years ago
- Configuration files for the SOF-ELK VM☆1,572Updated 2 weeks ago
- Identifies defensive gaps in security posture by leveraging Mitre's ATT&CK framework. #nsacyber☆163Updated 4 years ago