Decentralized Cyber Threat Intelligence Kaizen Framework
☆27Jan 31, 2022Updated 4 years ago
Alternatives and similar repositories for metemcyber
Users that are interested in metemcyber are comparing it to the libraries listed below
Sorting:
- Vulnerability Management with SBOM☆20Updated this week
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Apr 10, 2020Updated 5 years ago
- This is the GitHub repo of the OpenChain SBOM Study Group☆12Feb 18, 2026Updated 2 weeks ago
- This is the OpenChain Telco Work Group☆19Dec 3, 2025Updated 3 months ago
- Collection of Jupyter Notebook for Threat Hunting and Blue Team Purposes☆22Jun 15, 2022Updated 3 years ago
- Sharing Threat Hunting runbooks☆25Jul 5, 2019Updated 6 years ago
- Collection of various open-source an commercial rulesets for NIDS (especially for Suricata and Snort)☆29Jul 24, 2023Updated 2 years ago
- 脆弱性トリアージガイドライン作成の手引き☆30Jan 10, 2025Updated last year
- Repository with Sample threat hunting notebooks on Security Event Log Data Sources☆69Dec 2, 2022Updated 3 years ago
- ☆28Nov 25, 2025Updated 3 months ago
- ☆33Updated this week
- OCA-wide documentation shared by all sub-projects and repositories☆33Oct 31, 2024Updated last year
- Zeek-Formatted Threat Intelligence Feeds☆385Feb 25, 2026Updated last week
- The "Let's-defend-solution" directory contains the answers to all paths of the Let's Defend platform that were saved by the creator 8 mon…☆12Apr 27, 2023Updated 2 years ago
- This repository hosts community contributed Kestrel huntflows (.hf) and huntbooks (.ipynb)☆37Jan 2, 2024Updated 2 years ago
- Cheat sheets for threat hunting, detection and other stuff.☆34Oct 7, 2022Updated 3 years ago
- Detects attempts and successful exploitation of CVE-2022-26809☆33Sep 16, 2024Updated last year
- STIX 2.1 Visualizer, Attack and Activity Thread Graph for Threat Modeling☆33Dec 9, 2024Updated last year
- intelligence-icons is a collection of icons and diagrams for building training and marketing materials around Intelligence sharing; inclu…☆41Mar 17, 2019Updated 6 years ago
- Installation tools for CircleCI Server - Static☆10Jan 14, 2023Updated 3 years ago
- TOPPERSユーザーズフォーラム:ユーザのためのQ&Aおよび情報交換の場☆12Jun 16, 2022Updated 3 years ago
- A CVRF CSAF Converter, taking care about OASIS specification.☆10Jun 4, 2025Updated 9 months ago
- Jupyter Notebooks for Cyber Threat Intelligence☆35Sep 14, 2023Updated 2 years ago
- ☆11Oct 11, 2020Updated 5 years ago
- Cloud-Z gathers performance related information and benchmarks on cloud instances with support for multiple cloud providers.☆15Feb 18, 2023Updated 3 years ago
- Auto-deploy to GitHub using WP2Static☆11May 18, 2019Updated 6 years ago
- Code samples of querying the API services of Whois XML Api.☆12Dec 14, 2023Updated 2 years ago
- we are providing DevOps and security teams script to identify cloud workloads that may be vulnerable to the Log4j vulnerability(CVE-2021-…☆13Dec 17, 2021Updated 4 years ago
- ☆10Dec 5, 2017Updated 8 years ago
- Resources for the Kubernetes Fundamentals course.☆13Jan 14, 2025Updated last year
- GitHub action to produce a SBOM report from a given Black Duck project☆12Feb 5, 2026Updated 3 weeks ago
- ☆12Sep 15, 2025Updated 5 months ago
- The frontend app of Mailcow's CowUI web interface☆12Apr 29, 2024Updated last year
- Web interface to IntelMQ☆10Sep 10, 2025Updated 5 months ago
- ☆44Jul 11, 2025Updated 7 months ago
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)☆102Jul 10, 2025Updated 7 months ago
- Cyber Threat Intelligence Feeds☆98Sep 26, 2016Updated 9 years ago
- Library of threat hunts to get any user started!☆49Sep 4, 2020Updated 5 years ago
- A place to systematically store software bill of materials (SBOM) documents.☆50Jun 1, 2023Updated 2 years ago