nttcom / metemcyber
Decentralized Cyber Threat Intelligence Kaizen Framework
☆24Updated 3 years ago
Alternatives and similar repositories for metemcyber:
Users that are interested in metemcyber are comparing it to the libraries listed below
- Build a local copy of Known Exploited Vulnerabilities Catalog by CISA. Server mode for easy querying.☆18Updated last week
- RustyBlue is a rust implementation of DeepblueCLI, a forensics log analyzer for finding evidence of compromise from windows event logs.☆72Updated 2 years ago
- Prompt Hardener is a tool designed to evaluate and enhance the securify of system prompts for RAG systems.☆16Updated 3 months ago
- Ghidra Script for automated analysis of EMOTET☆17Updated 4 years ago
- A DFIR tool to analyze artifacts on macOS☆33Updated 4 years ago
- Automatically update IoC for lucky visitor scam☆26Updated this week
- Trivy based vulnerability management service☆55Updated last week
- コンテナ内から安全にダークウェブをクローリングするための環境☆13Updated 2 years ago
- Hands-on Exercises for "Dangerous attack paths: Modern Development Environment Security - Devices and CI/CD pipelines"☆45Updated 2 years ago
- Simple SOAR (Security Orchestration, Automation and Response) framework integrated with OPA/Rego☆23Updated this week
- ☆60Updated 10 months ago
- 脆弱性トリアージガイドライン作成の手引き☆27Updated 2 months ago
- CDIR Analyzer - parsers for data collected by CDIR Collector☆18Updated last year
- EXIST is a web application for aggregating and analyzing cyber threat intelligence.☆152Updated 2 years ago
- A DFIR tool to collect artifacts on macOS☆54Updated 5 years ago
- R-CSIRT Linux Triage tool☆38Updated 6 years ago
- Phishing URL dataset from JPCERT/CC☆172Updated 3 weeks ago
- Serverless SOAR (Security Orchestration, Automation and Response) framework for automatic inspection and evaluation of security alert☆46Updated last year
- VulsRepo is visualized based on the json report output in vuls.☆36Updated 3 years ago
- The Measure, Maximize, and Mature Threat-Informed Defense (M3TID) project defines what Threat-Informed Defense (TID) is and the key activ…☆15Updated this week
- Yet Another Memory Analyzer for malware detection☆177Updated 9 months ago
- Open-source Fabric templates for cybersecurity and compliance☆16Updated 2 months ago
- Vuls Beater for Elasticsearch - connecting vuls☆17Updated 4 years ago
- CVEs <--> Metasploit-Framework modules☆23Updated last week
- Core A2P2V functionality (command line based)☆67Updated 10 months ago
- RISKEN is a monitoring tool for visualizing security risks.☆21Updated this week
- ☆34Updated 3 years ago
- ☆16Updated last month
- Scalable security network sensor as low interaction honeypot☆16Updated last year
- A place to systematically store software bill of materials (SBOM) documents.☆44Updated last year